Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2019-16234 (GCVE-0-2019-16234)
Vulnerability from cvelistv5
Published
2019-09-11 15:29
Modified
2024-08-05 01:10
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
drivers/net/wireless/intel/iwlwifi/pcie/trans.c in the Linux kernel 5.2.14 does not check the alloc_workqueue return value, leading to a NULL pointer dereference.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T01:10:41.706Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://lkml.org/lkml/2019/9/9/487" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://security.netapp.com/advisory/ntap-20191004-0001/" }, { "name": "openSUSE-SU-2019:2392", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00064.html" }, { "name": "openSUSE-SU-2019:2444", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00010.html" }, { "name": "USN-4344-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "https://usn.ubuntu.com/4344-1/" }, { "name": "USN-4345-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "https://usn.ubuntu.com/4345-1/" }, { "name": "USN-4342-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "https://usn.ubuntu.com/4342-1/" }, { "name": "USN-4346-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "https://usn.ubuntu.com/4346-1/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "drivers/net/wireless/intel/iwlwifi/pcie/trans.c in the Linux kernel 5.2.14 does not check the alloc_workqueue return value, leading to a NULL pointer dereference." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2020-05-06T14:06:13", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://lkml.org/lkml/2019/9/9/487" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://security.netapp.com/advisory/ntap-20191004-0001/" }, { "name": "openSUSE-SU-2019:2392", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00064.html" }, { "name": "openSUSE-SU-2019:2444", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00010.html" }, { "name": "USN-4344-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "https://usn.ubuntu.com/4344-1/" }, { "name": "USN-4345-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "https://usn.ubuntu.com/4345-1/" }, { "name": "USN-4342-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "https://usn.ubuntu.com/4342-1/" }, { "name": "USN-4346-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "https://usn.ubuntu.com/4346-1/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2019-16234", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "drivers/net/wireless/intel/iwlwifi/pcie/trans.c in the Linux kernel 5.2.14 does not check the alloc_workqueue return value, leading to a NULL pointer dereference." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://lkml.org/lkml/2019/9/9/487", "refsource": "MISC", "url": "https://lkml.org/lkml/2019/9/9/487" }, { "name": "https://security.netapp.com/advisory/ntap-20191004-0001/", "refsource": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20191004-0001/" }, { "name": "openSUSE-SU-2019:2392", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00064.html" }, { "name": "openSUSE-SU-2019:2444", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00010.html" }, { "name": "USN-4344-1", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/4344-1/" }, { "name": "USN-4345-1", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/4345-1/" }, { "name": "USN-4342-1", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/4342-1/" }, { "name": "USN-4346-1", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/4346-1/" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2019-16234", "datePublished": "2019-09-11T15:29:40", "dateReserved": "2019-09-11T00:00:00", "dateUpdated": "2024-08-05T01:10:41.706Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2019-16234\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2019-09-11T16:15:11.770\",\"lastModified\":\"2024-11-21T04:30:20.350\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"drivers/net/wireless/intel/iwlwifi/pcie/trans.c in the Linux kernel 5.2.14 does not check the alloc_workqueue return value, leading to a NULL pointer dereference.\"},{\"lang\":\"es\",\"value\":\"El archivo drivers/net/wireless/intel/iwlwifi/pcie/trans.c en el kernel de Linux versi\u00f3n 5.2.14, no comprueba el valor de retorno en alloc_workqueue, conllevando a una desreferencia del puntero NULL.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H\",\"baseScore\":4.7,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"HIGH\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.0,\"impactScore\":3.6}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:L/AC:M/Au:N/C:N/I:N/A:C\",\"baseScore\":4.7,\"accessVector\":\"LOCAL\",\"accessComplexity\":\"MEDIUM\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"COMPLETE\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":3.4,\"impactScore\":6.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-476\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:5.2.14:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C324614A-D986-40EF-A933-4CD401A10B30\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*\",\"matchCriteriaId\":\"F7016A2A-8365-4F1A-89A2-7A19F2BCAE5B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*\",\"matchCriteriaId\":\"23A7C53F-B80F-4E6A-AFA9-58EEA84BE11D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F1E78106-58E6-4D59-990F-75DA575BFAD9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B620311B-34A3-48A6-82DF-6F078D7A4493\"}]}]}],\"references\":[{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00064.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00010.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://lkml.org/lkml/2019/9/9/487\",\"source\":\"cve@mitre.org\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://security.netapp.com/advisory/ntap-20191004-0001/\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://usn.ubuntu.com/4342-1/\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://usn.ubuntu.com/4344-1/\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://usn.ubuntu.com/4345-1/\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://usn.ubuntu.com/4346-1/\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00064.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00010.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://lkml.org/lkml/2019/9/9/487\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://security.netapp.com/advisory/ntap-20191004-0001/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://usn.ubuntu.com/4342-1/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://usn.ubuntu.com/4344-1/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://usn.ubuntu.com/4345-1/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://usn.ubuntu.com/4346-1/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}" } }
opensuse-su-2019:2444-1
Vulnerability from csaf_opensuse
Published
2019-11-05 17:28
Modified
2019-11-05 17:28
Summary
Security update for the Linux Kernel
Notes
Title of the patch
Security update for the Linux Kernel
Description of the patch
The openSUSE Leap 15.1 kernel was updated to receive various security and bugfixes.
The following security bugs were fixed:
- CVE-2019-16995: A memory leak exits in hsr_dev_finalize() in net/hsr/hsr_device.c. if hsr_add_port fails to add a port, which may cause denial of service, aka CID-6caabe7f197d (bnc#1152685).
- CVE-2019-16233: drivers/scsi/qla2xxx/qla_os.c did not check the alloc_workqueue return value, leading to a NULL pointer dereference (bnc#1150457).
- CVE-2019-17666: rtl_p2p_noa_ie in drivers/net/wireless/realtek/rtlwifi/ps.c lacked a certain upper-bound check, leading to a buffer overflow (bnc#1154372).
- CVE-2019-16232: drivers/net/wireless/marvell/libertas/if_sdio.c did not check the alloc_workqueue return value, leading to a NULL pointer dereference (bnc#1150465).
- CVE-2019-16234: drivers/net/wireless/intel/iwlwifi/pcie/trans.c did not check the alloc_workqueue return value, leading to a NULL pointer dereference (bnc#1150452).
- CVE-2019-17133: cfg80211_mgd_wext_giwessid in net/wireless/wext-sme.c did not reject a long SSID IE, leading to a Buffer Overflow (bnc#1153158).
- CVE-2019-17056: llcp_sock_create in net/nfc/llcp_sock.c in the AF_NFC network module did not enforce CAP_NET_RAW, which means that unprivileged users can create a raw socket, aka CID-3a359798b176 (bnc#1152788).
The following non-security bugs were fixed:
- 9p: avoid attaching writeback_fid on mmap with type PRIVATE (bsc#1051510).
- ACPI / CPPC: do not require the _PSD method (bsc#1051510).
- ACPI: CPPC: Set pcc_data[pcc_ss_id] to NULL in acpi_cppc_processor_exit() (bsc#1051510).
- ACPI / processor: do not print errors for processorIDs == 0xff (bsc#1051510).
- act_mirred: Fix mirred_init_module error handling (bsc#1051510).
- Add Acer Aspire Ethos 8951G model quirk (bsc#1051510).
- Add kernel module compression support (bsc#1135854)
- ALSA: hda - Add a quirk model for fixing Huawei Matebook X right speaker (bsc#1051510).
- ALSA: hda: Add Elkhart Lake PCI ID (bsc#1051510).
- ALSA: hda - Add laptop imic fixup for ASUS M9V laptop (bsc#1051510).
- ALSA: hda: Add support of Zhaoxin controller (bsc#1051510).
- ALSA: hda: Add Tigerlake/Jasperlake PCI ID (bsc#1051510).
- ALSA: hda - Apply AMD controller workaround for Raven platform (bsc#1051510).
- ALSA: hda - Define a fallback_pin_fixup_tbl for alc269 family (bsc#1051510).
- ALSA: hda - Drop unsol event handler for Intel HDMI codecs (bsc#1051510).
- ALSA: hda - Expand pin_match function to match upcoming new tbls (bsc#1051510).
- ALSA: hda: Flush interrupts on disabling (bsc#1051510).
- ALSA: hda - Force runtime PM on Nvidia HDMI codecs (bsc#1051510).
- ALSA: hda/hdmi - Do not report spurious jack state changes (bsc#1051510).
- ALSA: hda/hdmi: remove redundant assignment to variable pcm_idx (bsc#1051510).
- ALSA: hda - Inform too slow responses (bsc#1051510).
- ALSA: hda/realtek - Add support for ALC711 (bsc#1051510).
- ALSA: hda/realtek - Blacklist PC beep for Lenovo ThinkCentre M73/93 (bsc#1051510).
- ALSA: hda/realtek - Check beep whitelist before assigning in all codecs (bsc#1051510).
- ALSA: hda/realtek - Enable headset mic on Asus MJ401TA (bsc#1051510).
- ALSA: hda/realtek - Fix alienware headset mic (bsc#1051510).
- ALSA: hda/realtek - PCI quirk for Medion E4254 (bsc#1051510).
- ALSA: hda/realtek: Reduce the Headphone static noise on XPS 9350/9360 (bsc#1051510).
- ALSA: hda: Set fifo_size for both playback and capture streams (bsc#1051510).
- ALSA: hda - Show the fatal CORB/RIRB error more clearly (bsc#1051510).
- ALSA: hda/sigmatel - remove unused variable 'stac9200_core_init' (bsc#1051510).
- ALSA: i2c: ak4xxx-adda: Fix a possible null pointer dereference in build_adc_controls() (bsc#1051510).
- ALSA: line6: sizeof (byte) is always 1, use that fact (bsc#1051510).
- ALSA: usb-audio: Add DSD support for EVGA NU Audio (bsc#1051510).
- ALSA: usb-audio: Add Hiby device family to quirks for native DSD support (bsc#1051510).
- ALSA: usb-audio: Add Pioneer DDJ-SX3 PCM quirck (bsc#1051510).
- ALSA: usb-audio: Clean up check_input_term() (bsc#1051510).
- ALSA: usb-audio: Disable quirks for BOSS Katana amplifiers (bsc#1051510).
- ALSA: usb-audio: DSD auto-detection for Playback Designs (bsc#1051510).
- ALSA: usb-audio: fix PCM device order (bsc#1051510).
- ALSA: usb-audio: Fix possible NULL dereference at create_yamaha_midi_quirk() (bsc#1051510).
- ALSA: usb-audio: More validations of descriptor units (bsc#1051510).
- ALSA: usb-audio: remove some dead code (bsc#1051510).
- ALSA: usb-audio: Remove superfluous bLength checks (bsc#1051510).
- ALSA: usb-audio: Simplify parse_audio_unit() (bsc#1051510).
- ALSA: usb-audio: Skip bSynchAddress endpoint check if it is invalid (bsc#1051510).
- ALSA: usb-audio: Unify audioformat release code (bsc#1051510).
- ALSA: usb-audio: Unify the release of usb_mixer_elem_info objects (bsc#1051510).
- ALSA: usb-audio: Update DSD support quirks for Oppo and Rotel (bsc#1051510).
- appletalk: enforce CAP_NET_RAW for raw sockets (bsc#1051510).
- arcnet: provide a buffer big enough to actually receive packets (networking-stable-19_09_30).
- ASoC: Define a set of DAPM pre/post-up events (bsc#1051510).
- ASoC: dmaengine: Make the pcm->name equal to pcm->id if the name is not set (bsc#1051510).
- ASoC: Intel: Fix use of potentially uninitialized variable (bsc#1051510).
- ASoC: Intel: NHLT: Fix debug print format (bsc#1051510).
- ASoc: rockchip: i2s: Fix RPM imbalance (bsc#1051510).
- ASoC: rsnd: Reinitialize bit clock inversion flag for every format setting (bsc#1051510).
- ASoC: sgtl5000: Fix charge pump source assignment (bsc#1051510).
- auxdisplay: panel: need to delete scan_timer when misc_register fails in panel_attach (bsc#1051510).
- ax25: enforce CAP_NET_RAW for raw sockets (bsc#1051510).
- Blacklist 'signal: Correct namespace fixups of si_pid and si_uid' (bsc#1142667)
- blk-wbt: abstract out end IO completion handler (bsc#1135873).
- blk-wbt: fix has-sleeper queueing check (bsc#1135873).
- blk-wbt: improve waking of tasks (bsc#1135873).
- blk-wbt: move disable check into get_limit() (bsc#1135873).
- blk-wbt: use wq_has_sleeper() for wq active check (bsc#1135873).
- block: add io timeout to sysfs (bsc#1148410).
- block: add io timeout to sysfs (bsc#1148410).
- block: do not show io_timeout if driver has no timeout handler (bsc#1148410).
- block: do not show io_timeout if driver has no timeout handler (bsc#1148410).
- bluetooth: btrtl: Additional Realtek 8822CE Bluetooth devices (bsc#1051510).
- bnx2x: Fix VF's VLAN reconfiguration in reload (bsc#1086323 ).
- bnxt_en: Add PCI IDs for 57500 series NPAR devices (bsc#1153607).
- bpf: fix use after free in prog symbol exposure (bsc#1083647).
- bridge/mdb: remove wrong use of NLM_F_MULTI (networking-stable-19_09_15).
- btrfs: bail out gracefully rather than BUG_ON (bsc#1153646).
- btrfs: block-group: Fix a memory leak due to missing btrfs_put_block_group() (bsc#1155178).
- btrfs: check for the full sync flag while holding the inode lock during fsync (bsc#1153713).
- btrfs: Ensure btrfs_init_dev_replace_tgtdev sees up to date values (bsc#1154651).
- btrfs: Ensure replaced device does not have pending chunk allocation (bsc#1154607).
- btrfs: qgroup: Always free PREALLOC META reserve in btrfs_delalloc_release_extents() (bsc#1155179).
- btrfs: remove wrong use of volume_mutex from btrfs_dev_replace_start (bsc#1154651).
- btrfs: tracepoints: Fix bad entry members of qgroup events (bsc#1155186).
- btrfs: tracepoints: Fix wrong parameter order for qgroup events (bsc#1155184).
- can: mcp251x: mcp251x_hw_reset(): allow more time after a reset (bsc#1051510).
- can: xilinx_can: xcan_probe(): skip error message on deferred probe (bsc#1051510).
- cdc_ether: fix rndis support for Mediatek based smartphones (networking-stable-19_09_15).
- cdc_ncm: fix divide-by-zero caused by invalid wMaxPacketSize (bsc#1051510).
- ceph: fix directories inode i_blkbits initialization (bsc#1153717).
- ceph: reconnect connection if session hang in opening state (bsc#1153718).
- ceph: update the mtime when truncating up (bsc#1153719).
- cfg80211: add and use strongly typed element iteration macros (bsc#1051510).
- cfg80211: Purge frame registrations on iftype change (bsc#1051510).
- clk: at91: select parent if main oscillator or bypass is enabled (bsc#1051510).
- clk: qoriq: Fix -Wunused-const-variable (bsc#1051510).
- clk: sirf: Do not reference clk_init_data after registration (bsc#1051510).
- clk: zx296718: Do not reference clk_init_data after registration (bsc#1051510).
- crypto: af_alg - consolidation of duplicate code (bsc#1154737).
- crypto: af_alg - fix race accessing cipher request (bsc#1154737).
- crypto: af_alg - Fix race around ctx->rcvused by making it atomic_t (bsc#1154737).
- crypto: af_alg - Initialize sg_num_bytes in error code path (bsc#1051510).
- crypto: af_alg - remove locking in async callback (bsc#1154737).
- crypto: af_alg - update correct dst SGL entry (bsc#1051510).
- crypto: af_alg - wait for data at beginning of recvmsg (bsc#1154737).
- crypto: algif_aead - copy AAD from src to dst (bsc#1154737).
- crypto: algif_aead - fix reference counting of null skcipher (bsc#1154737).
- crypto: algif_aead - overhaul memory management (bsc#1154737).
- crypto: algif_aead - skip SGL entries with NULL page (bsc#1154737).
- crypto: algif - return error code when no data was processed (bsc#1154737).
- crypto: algif_skcipher - overhaul memory management (bsc#1154737).
- crypto: talitos - fix missing break in switch statement (bsc#1142635).
- cxgb4: do not dma memory off of the stack (bsc#1152790).
- cxgb4: fix endianness for vlan value in cxgb4_tc_flower (bsc#1064802 bsc#1066129).
- cxgb4:Fix out-of-bounds MSI-X info array access (networking-stable-19_10_05).
- cxgb4: offload VLAN flows regardless of VLAN ethtype (bsc#1064802 bsc#1066129).
- cxgb4: reduce kernel stack usage in cudbg_collect_mem_region() (bsc#1073513).
- cxgb4: Signedness bug in init_one() (bsc#1097585 bsc#1097586 bsc#1097587 bsc#1097588 bsc#1097583 bsc#1097584).
- cxgb4: smt: Add lock for atomic_dec_and_test (bsc#1064802 bsc#1066129).
- dasd_fba: Display '00000000' for zero page when dumping sense
- /dev/mem: Bail out upon SIGKILL (git-fixes).
- drm: add __user attribute to ptr_to_compat() (bsc#1111666).
- drm/amd/display: fix issue where 252-255 values are clipped (bsc#1111666).
- drm/amd/display: reprogram VM config when system resume (bsc#1111666).
- drm/amd/display: Restore backlight brightness after system resume (bsc#1112178)
- drm/amd/display: support spdif (bsc#1111666).
- drm/amd/dm: Understand why attaching path/tile properties are needed (bsc#1111666).
- drm/amdgpu: Check for valid number of registers to read (bsc#1051510).
- drm/amdgpu: Fix KFD-related kernel oops on Hawaii (bsc#1111666).
- drm/amdgpu/gfx9: Update gfx9 golden settings (bsc#1111666).
- drm/amdgpu/si: fix ASIC tests (git-fixes).
- drm/amdgpu: Update gc_9_0 golden settings (bsc#1111666).
- drm/amdkfd: Add missing Polaris10 ID (bsc#1111666).
- drm/amd/powerplay/smu7: enforce minimal VBITimeout (v2) (bsc#1051510).
- drm/amd/pp: Fix truncated clock value when set watermark (bsc#1111666).
- drm/ast: Fixed reboot test may cause system hanged (bsc#1051510).
- drm/atomic_helper: Allow DPMS On<->Off changes for unregistered connectors (bsc#1111666).
- drm/atomic_helper: Disallow new modesets on unregistered connectors (bsc#1111666).
- drm/atomic_helper: Stop modesets on unregistered connectors harder (bsc#1111666).
- drm/bridge: tc358767: Increase AUX transfer length limit (bsc#1051510).
- drm/bridge: tfp410: fix memleak in get_modes() (bsc#1111666).
- drm/edid: Add 6 bpc quirk for SDC panel in Lenovo G50 (bsc#1051510).
- drm: Flush output polling on shutdown (bsc#1051510).
- drm/i915: Cleanup gt powerstate from gem (bsc#1111666).
- drm/i915: Fix intel_dp_mst_best_encoder() (bsc#1111666).
- drm/i915/gvt: update vgpu workload head pointer correctly (bsc#1112178)
- drm/i915: Restore sane defaults for KMS on GEM error load (bsc#1111666).
- drm/mediatek: set DMA max segment size (bsc#1111666).
- drm/msm/dsi: Fix return value check for clk_get_parent (bsc#1111666).
- drm/msm/dsi: Implement reset correctly (bsc#1051510).
- drm/nouveau/disp/nv50-: fix center/aspect-corrected scaling (bsc#1111666).
- drm/nouveau/kms/nv50-: Do not create MSTMs for eDP connectors (bsc#1112178)
- drm/nouveau/volt: Fix for some cards having 0 maximum voltage (bsc#1111666).
- drm/omap: fix max fclk divider for omap36xx (bsc#1111666).
- drm/panel: check failure cases in the probe func (bsc#1111666).
- drm/panel: make drm_panel.h self-contained (bsc#1111666).
- drm: panel-orientation-quirks: Add extra quirk table entry for GPD MicroPC (bsc#1111666).
- drm/panel: simple: fix AUO g185han01 horizontal blanking (bsc#1051510).
- drm/radeon: Bail earlier when radeon.cik_/si_support=0 is passed (bsc#1111666).
- drm/radeon: Fix EEH during kexec (bsc#1051510).
- drm: rcar-du: lvds: Fix bridge_to_rcar_lvds (bsc#1111666).
- drm/rockchip: Check for fast link training before enabling psr (bsc#1111666).
- drm/stm: attach gem fence to atomic state (bsc#1111666).
- drm/tilcdc: Register cpufreq notifier after we have initialized crtc (bsc#1051510).
- drm/vmwgfx: Fix double free in vmw_recv_msg() (bsc#1051510).
- e1000e: add workaround for possible stalled packet (bsc#1051510).
- efi/arm: Show SMBIOS bank/device location in CPER and GHES error logs (bsc#1152033).
- efi: cper: print AER info of PCIe fatal error (bsc#1051510).
- efi/memattr: Do not bail on zero VA if it equals the region's PA (bsc#1051510).
- efivar/ssdt: Do not iterate over EFI vars if no SSDT override was specified (bsc#1051510).
- firmware: dmi: Fix unlikely out-of-bounds read in save_mem_devices (git-fixes).
- Fix AMD IOMMU kABI (bsc#1154610).
- Fix KVM kABI after x86 mmu backports (bsc#1117665).
- gpu: drm: radeon: Fix a possible null-pointer dereference in radeon_connector_set_property() (bsc#1051510).
- HID: apple: Fix stuck function keys when using FN (bsc#1051510).
- HID: fix error message in hid_open_report() (bsc#1051510).
- HID: hidraw: Fix invalid read in hidraw_ioctl (bsc#1051510).
- HID: logitech: Fix general protection fault caused by Logitech driver (bsc#1051510).
- HID: logitech-hidpp: do all FF cleanup in hidpp_ff_destroy() (bsc#1051510).
- HID: prodikeys: Fix general protection fault during probe (bsc#1051510).
- HID: sony: Fix memory corruption issue on cleanup (bsc#1051510).
- hso: fix NULL-deref on tty open (bsc#1051510).
- hwmon: (acpi_power_meter) Change log level for 'unsafe software power cap' (bsc#1051510).
- hwrng: core - do not wait on add_early_randomness() (git-fixes).
- i2c: riic: Clear NACK in tend isr (bsc#1051510).
- IB/core, ipoib: Do not overreact to SM LID change event (bsc#1154108)
- IB/hfi1: Remove overly conservative VM_EXEC flag check (bsc#1144449).
- IB/mlx5: Consolidate use_umr checks into single function (bsc#1093205).
- IB/mlx5: Fix MR re-registration flow to use UMR properly (bsc#1093205).
- IB/mlx5: Report correctly tag matching rendezvous capability (bsc#1046305).
- ieee802154: atusb: fix use-after-free at disconnect (bsc#1051510).
- ieee802154: ca8210: prevent memory leak (bsc#1051510).
- ieee802154: enforce CAP_NET_RAW for raw sockets (bsc#1051510).
- iio: adc: ad799x: fix probe error handling (bsc#1051510).
- iio: light: opt3001: fix mutex unlock race (bsc#1051510).
- ima: always return negative code for error (bsc#1051510).
- Input: da9063 - fix capability and drop KEY_SLEEP (bsc#1051510).
- Input: synaptics-rmi4 - avoid processing unknown IRQs (bsc#1051510).
- iommu/amd: Apply the same IVRS IOAPIC workaround to Acer Aspire A315-41 (bsc#1137799).
- iommu/amd: Check PM_LEVEL_SIZE() condition in locked section (bsc#1154608).
- iommu/amd: Override wrong IVRS IOAPIC on Raven Ridge systems (bsc#1137799).
- iommu/amd: Remove domain->updated (bsc#1154610).
- iommu/amd: Wait for completion of IOTLB flush in attach_device (bsc#1154611).
- ipmi_si: Only schedule continuously in the thread in maintenance mode (bsc#1051510).
- ipv6: drop incoming packets having a v4mapped source address (networking-stable-19_10_05).
- ipv6: Fix the link time qualifier of 'ping_v6_proc_exit_net()' (networking-stable-19_09_15).
- ipv6: Handle missing host route in __ipv6_ifa_notify (networking-stable-19_10_05).
- iwlwifi: pcie: fix memory leaks in iwl_pcie_ctxt_info_gen3_init (bsc#1111666).
- ixgbe: Fix secpath usage for IPsec TX offload (bsc#1113994 bsc#1151807).
- ixgbe: Prevent u8 wrapping of ITR value to something less than 10us (bsc#1101674).
- ixgbe: sync the first fragment unconditionally (bsc#1133140).
- kabi: net: sched: act_sample: fix psample group handling on overwrite (networking-stable-19_09_05).
- kABI workaround for crypto/af_alg changes (bsc#1154737).
- kABI workaround for drm_connector.registered type changes (bsc#1111666).
- kABI workaround for snd_hda_pick_pin_fixup() changes (bsc#1051510).
- kernel-binary.spec.in: Fix build of non-modular kernels (boo#1154578).
- kernel-subpackage-build: create zero size ghost for uncompressed vmlinux (bsc#1154354).
- kernel/sysctl.c: do not override max_threads provided by userspace (bnc#1150875).
- ksm: cleanup stable_node chain collapse case (bnc#1144338).
- ksm: fix use after free with merge_across_nodes = 0 (bnc#1144338).
- ksm: introduce ksm_max_page_sharing per page deduplication limit (bnc#1144338).
- ksm: optimize refile of stable_node_dup at the head of the chain (bnc#1144338).
- ksm: swap the two output parameters of chain/chain_prune (bnc#1144338).
- kvm: Convert kvm_lock to a mutex (bsc#1117665).
- kvm: MMU: drop vcpu param in gpte_access (bsc#1117665).
- kvm: PPC: Book3S HV: use smp_mb() when setting/clearing host_ipi flag (bsc#1061840).
- kvm: x86: add tracepoints around __direct_map and FNAME(fetch) (bsc#1117665).
- kvm: x86: adjust kvm_mmu_page member to save 8 bytes (bsc#1117665).
- kvm: x86: change kvm_mmu_page_get_gfn BUG_ON to WARN_ON (bsc#1117665).
- kvm: x86: Do not release the page inside mmu_set_spte() (bsc#1117665).
- kvm: x86: make FNAME(fetch) and __direct_map more similar (bsc#1117665).
- kvm: x86, powerpc: do not allow clearing largepages debugfs entry (bsc#1117665).
- kvm: x86: remove now unneeded hugepage gfn adjustment (bsc#1117665).
- libertas: Add missing sentinel at end of if_usb.c fw_table (bsc#1051510).
- lib/mpi: Fix karactx leak in mpi_powm (bsc#1051510).
- libnvdimm/security: provide fix for secure-erase to use zero-key (bsc#1149853).
- lpfc: Add additional discovery log messages (bsc#1154521).
- lpfc: Add FA-WWN Async Event reporting (bsc#1154521).
- lpfc: Add FC-AL support to lpe32000 models (bsc#1154521).
- lpfc: Add log macros to allow print by serverity or verbocity setting (bsc#1154521).
- lpfc: Fix bad ndlp ptr in xri aborted handling (bsc#1154521).
- lpfc: fix coverity error of dereference after null check (bsc#1154521).
- lpfc: Fix hardlockup in lpfc_abort_handler (bsc#1154521).
- lpfc: Fix lockdep errors in sli_ringtx_put (bsc#1154521).
- lpfc: fix lpfc_nvmet_mrq to be bound by hdw queue count (bsc#1154521).
- lpfc: Fix reporting of read-only fw error errors (bsc#1154521).
- lpfc: Fix SLI3 hba in loop mode not discovering devices (bsc#1154521).
- lpfc: Make FW logging dynamically configurable (bsc#1154521).
- lpfc: Remove lock contention target write path (bsc#1154521).
- lpfc: Revise interrupt coalescing for missing scenarios (bsc#1154521).
- lpfc: Slight fast-path Performance optimizations (bsc#1154521).
- lpfc: Update lpfc version to 12.6.0.0 (bsc#1154521).
- mac80211: accept deauth frames in IBSS mode (bsc#1051510).
- mac80211: fix txq null pointer dereference (bsc#1051510).
- mac80211: Reject malformed SSID elements (bsc#1051510).
- macsec: drop skb sk before calling gro_cells_receive (bsc#1051510).
- media: atmel: atmel-isc: fix asd memory allocation (bsc#1135642).
- media: cpia2_usb: fix memory leaks (bsc#1051510).
- media: dvb-core: fix a memory leak bug (bsc#1051510).
- media: exynos4-is: fix leaked of_node references (bsc#1051510).
- media: gspca: zero usb_buf on error (bsc#1051510).
- media: hdpvr: Add device num check and handling (bsc#1051510).
- media: hdpvr: add terminating 0 at end of string (bsc#1051510).
- media: i2c: ov5645: Fix power sequence (bsc#1051510).
- media: iguanair: add sanity checks (bsc#1051510).
- media: omap3isp: Do not set streaming state on random subdevs (bsc#1051510).
- media: omap3isp: Set device on omap3isp subdevs (bsc#1051510).
- media: ov9650: add a sanity check (bsc#1051510).
- media: radio/si470x: kill urb on error (bsc#1051510).
- media: saa7134: fix terminology around saa7134_i2c_eeprom_md7134_gate() (bsc#1051510).
- media: saa7146: add cleanup in hexium_attach() (bsc#1051510).
- media: sn9c20x: Add MSI MS-1039 laptop to flip_dmi_table (bsc#1051510).
- media: stkwebcam: fix runtime PM after driver unbind (bsc#1051510).
- media: ttusb-dec: Fix info-leak in ttusb_dec_send_command() (bsc#1051510).
- memstick: jmb38x_ms: Fix an error handling path in 'jmb38x_ms_probe()' (bsc#1051510).
- mfd: intel-lpss: Remove D3cold delay (bsc#1051510).
- mISDN: enforce CAP_NET_RAW for raw sockets (bsc#1051510).
- mld: fix memory leak in mld_del_delrec() (networking-stable-19_09_05).
- mmc: sdhci: Fix incorrect switch to HS mode (bsc#1051510).
- mmc: sdhci: improve ADMA error reporting (bsc#1051510).
- mmc: sdhci-of-esdhc: set DMA snooping based on DMA coherence (bsc#1051510).
- netfilter: nf_nat: do not bug when mapping already exists (bsc#1146612).
- net: Fix null de-reference of device refcount (networking-stable-19_09_15).
- net: fix skb use after free in netpoll (networking-stable-19_09_05).
- net: gso: Fix skb_segment splat when splitting gso_size mangled skb having linear-headed frag_list (networking-stable-19_09_15).
- net/ibmvnic: Fix EOI when running in XIVE mode (bsc#1089644, ltc#166495, ltc#165544, git-fixes).
- net/mlx4_en: fix a memory leak bug (bsc#1046299).
- net/mlx5: Add device ID of upcoming BlueField-2 (bsc#1046303 ).
- net/mlx5: Fix error handling in mlx5_load() (bsc#1046305 ).
- net/phy: fix DP83865 10 Mbps HDX loopback disable function (networking-stable-19_09_30).
- net: qlogic: Fix memory leak in ql_alloc_large_buffers (networking-stable-19_10_05).
- net: qrtr: Stop rx_worker before freeing node (networking-stable-19_09_30).
- net/rds: Fix error handling in rds_ib_add_one() (networking-stable-19_10_05).
- net/rds: fix warn in rds_message_alloc_sgs (bsc#1154848).
- net/rds: remove user triggered WARN_ON in rds_sendmsg (bsc#1154848).
- net: Replace NF_CT_ASSERT() with WARN_ON() (bsc#1146612).
- net/sched: act_sample: do not push mac header on ip6gre ingress (networking-stable-19_09_30).
- net: sched: act_sample: fix psample group handling on overwrite (networking-stable-19_09_05).
- net_sched: add policy validation for action attributes (networking-stable-19_09_30).
- net_sched: fix backward compatibility for TCA_ACT_KIND (git-fixes).
- net: stmmac: dwmac-rk: Do not fail if phy regulator is absent (networking-stable-19_09_05).
- net: Unpublish sk from sk_reuseport_cb before call_rcu (networking-stable-19_10_05).
- nfc: fix attrs checks in netlink interface (bsc#1051510).
- nfc: fix memory leak in llcp_sock_bind() (bsc#1051510).
- nfc: pn533: fix use-after-free and memleaks (bsc#1051510).
- NFSv4.1 - backchannel request should hold ref on xprt (bsc#1152624).
- nl80211: fix null pointer dereference (bsc#1051510).
- objtool: Clobber user CFLAGS variable (bsc#1153236).
- openvswitch: change type of UPCALL_PID attribute to NLA_UNSPEC (networking-stable-19_09_30).
- packaging: add support for riscv64
- PCI: Correct pci=resource_alignment parameter example (bsc#1051510).
- PCI: dra7xx: Fix legacy INTD IRQ handling (bsc#1087092).
- PCI: hv: Use bytes 4 and 5 from instance ID as the PCI domain numbers (bsc#1153263).
- PCI: PM: Fix pci_power_up() (bsc#1051510).
- pinctrl: cherryview: restore Strago DMI workaround for all versions (bsc#1111666).
- pinctrl: tegra: Fix write barrier placement in pmx_writel (bsc#1051510).
- platform/x86: classmate-laptop: remove unused variable (bsc#1051510).
- platform/x86: i2c-multi-instantiate: Derive the device name from parent (bsc#1111666).
- platform/x86: i2c-multi-instantiate: Fail the probe if no IRQ provided (bsc#1111666).
- platform/x86: pmc_atom: Add Siemens SIMATIC IPC277E to critclk_systems DMI table (bsc#1051510).
- powerpc/64s/pseries: radix flush translations before MMU is enabled at boot (bsc#1055186).
- powerpc/64s/radix: keep kernel ERAT over local process/guest invalidates (bsc#1055186).
- powerpc/64s/radix: tidy up TLB flushing code (bsc#1055186).
- powerpc/64s: Rename PPC_INVALIDATE_ERAT to PPC_ISA_3_0_INVALIDATE_ERAT (bsc#1055186).
- powerpc/mm/book3s64: Move book3s64 code to pgtable-book3s64 (bsc#1055186).
- powerpc/mm: mark more tlb functions as __always_inline (bsc#1055186).
- powerpc/mm: Properly invalidate when setting process table base (bsc#1055186).
- powerpc/mm/radix: mark as __tlbie_pid() and friends as__always_inline (bsc#1055186).
- powerpc/mm/radix: mark __radix__flush_tlb_range_psize() as __always_inline (bsc#1055186).
- powerpc/pseries/mobility: use cond_resched when updating device tree (bsc#1153112 ltc#181778).
- powerpc/pseries: Remove confusing warning message (bsc#1109158).
- powerpc/rtas: allow rescheduling while changing cpu states (bsc#1153112 ltc#181778).
- powerplay: Respect units on max dcfclk watermark (bsc#1111666).
- power: supply: sysfs: ratelimit property read error message (bsc#1051510).
- qed: iWARP - Fix default window size to be based on chip (bsc#1050536 bsc#1050545).
- qed: iWARP - Fix tc for MPA ll2 connection (bsc#1050536 bsc#1050545).
- qed: iWARP - fix uninitialized callback (bsc#1050536 bsc#1050545).
- qed: iWARP - Use READ_ONCE and smp_store_release to access ep->state (bsc#1050536 bsc#1050545).
- qmi_wwan: add support for Cinterion CLS8 devices (networking-stable-19_10_05).
- r8152: Set macpassthru in reset_resume callback (bsc#1051510).
- RDMA/bnxt_re: Fix spelling mistake 'missin_resp' -> 'missing_resp' (bsc#1050244).
- RDMA: Fix goto target to release the allocated memory (bsc#1050244).
- rds: Fix warning (bsc#1154848).
- Revert 'drm/amd/display: Fix underscan not using proper scaling' (bsc#1111666).
- Revert 'drm/amd/powerplay: Enable/Disable NBPSTATE on On/OFF of UVD' (bsc#1111666).
- Revert 'drm/radeon: Fix EEH during kexec' (bsc#1051510).
- rtlwifi: rtl8192cu: Fix value set in descriptor (bsc#1142635).
- s390/cmf: set_schib_wait add timeout (bsc#1153509, bsc#1153476).
- s390/crypto: fix gcm-aes-s390 selftest failures (bsc#1137861 LTC#178091).
- sch_cbq: validate TCA_CBQ_WRROPT to avoid crash (networking-stable-19_10_05).
- sch_dsmark: fix potential NULL deref in dsmark_init() (networking-stable-19_10_05).
- sch_hhf: ensure quantum and hhf_non_hh_weight are non-zero (networking-stable-19_09_15).
- sch_netem: fix a divide by zero in tabledist() (networking-stable-19_09_30).
- scsi: lpfc: Check queue pointer before use (bsc#1154242).
- scsi: lpfc: cleanup: remove unused fcp_txcmlpq_cnt (bsc#1154521).
- scsi: lpfc: Complete removal of FCoE T10 PI support on SLI-4 adapters (bsc#1154521).
- scsi: lpfc: Convert existing %pf users to %ps (bsc#1154521).
- scsi: lpfc: Fix coverity errors on NULL pointer checks (bsc#1154521).
- scsi: lpfc: Fix device recovery errors after PLOGI failures (bsc#1154521).
- scsi: lpfc: Fix devices that do not return after devloss followed by rediscovery (bsc#1137040).
- scsi: lpfc: Fix discovery failures when target device connectivity bounces (bsc#1154521).
- scsi: lpfc: Fix GPF on scsi command completion (bsc#1154521).
- scsi: lpfc: Fix hdwq sgl locks and irq handling (bsc#1154521).
- scsi: lpfc: Fix host hang at boot or slow boot (bsc#1154521).
- scsi: lpfc: Fix list corruption detected in lpfc_put_sgl_per_hdwq (bsc#1154521).
- scsi: lpfc: Fix list corruption in lpfc_sli_get_iocbq (bsc#1154521).
- scsi: lpfc: Fix locking on mailbox command completion (bsc#1154521).
- scsi: lpfc: Fix miss of register read failure check (bsc#1154521).
- scsi: lpfc: Fix null ptr oops updating lpfc_devloss_tmo via sysfs attribute (bsc#1140845).
- scsi: lpfc: Fix NVMe ABTS in response to receiving an ABTS (bsc#1154521).
- scsi: lpfc: Fix NVME io abort failures causing hangs (bsc#1154521).
- scsi: lpfc: Fix premature re-enabling of interrupts in lpfc_sli_host_down (bsc#1154521).
- scsi: lpfc: Fix propagation of devloss_tmo setting to nvme transport (bsc#1140883).
- scsi: lpfc: Fix pt2pt discovery on SLI3 HBAs (bsc#1154521).
- scsi: lpfc: Fix rpi release when deleting vport (bsc#1154521).
- scsi: lpfc: Fix spinlock_irq issues in lpfc_els_flush_cmd() (bsc#1154521).
- scsi: lpfc: Make function lpfc_defer_pt2pt_acc static (bsc#1154521).
- scsi: lpfc: Remove bg debugfs buffers (bsc#1144375).
- scsi: lpfc: remove left-over BUILD_NVME defines (bsc#1154268).
- scsi: lpfc: Update async event logging (bsc#1154521).
- scsi: lpfc: Update lpfc version to 12.4.0.1 (bsc#1154521).
- scsi: qedf: fc_rport_priv reference counting fixes (bsc#1098291).
- scsi: qedf: Modify abort and tmf handler to handle edge condition and flush (bsc#1098291).
- scsi: qla2xxx: Add error handling for PLOGI ELS passthrough (bsc#1143706 bsc#1082635 bsc#1123034).
- scsi: qla2xxx: Capture FW dump on MPI heartbeat stop event (bsc#1143706 bsc#1082635 bsc#1123034).
- scsi: qla2xxx: Check for MB timeout while capturing ISP27/28xx FW dump (bsc#1143706 bsc#1082635 bsc#1123034).
- scsi: qla2xxx: Dual FCP-NVMe target port support (bsc#1143706 bsc#1082635 bsc#1123034).
- scsi: qla2xxx: Fix N2N link reset (bsc#1143706 bsc#1082635 bsc#1123034).
- scsi: qla2xxx: Fix N2N link up fail (bsc#1143706 bsc#1082635 bsc#1123034).
- scsi: qla2xxx: Fix stale mem access on driver unload (bsc#1143706 bsc#1082635 bsc#1123034).
- scsi: qla2xxx: Fix unbound sleep in fcport delete path (bsc#1143706 bsc#1082635 bsc#1123034).
- scsi: qla2xxx: Fix wait condition in loop (bsc#1143706 bsc#1082635 bsc#1123034).
- scsi: qla2xxx: Improve logging for scan thread (bsc#1143706 bsc#1082635 bsc#1123034).
- scsi: qla2xxx: Optimize NPIV tear down process (bsc#1143706 bsc#1082635 bsc#1123034).
- scsi: qla2xxx: remove redundant assignment to pointer host (bsc#1143706 bsc#1082635 bsc#1123034).
- scsi: qla2xxx: Remove WARN_ON_ONCE in qla2x00_status_cont_entry() (bsc#1143706 bsc#1082635 bsc#1123034).
- scsi: qla2xxx: Set remove flag for all VP (bsc#1143706 bsc#1082635 bsc#1123034).
- scsi: qla2xxx: Silence fwdump template message (bsc#1143706 bsc#1082635 bsc#1123034).
- scsi: qla2xxx: Update driver version to 10.01.00.20-k (bsc#1143706 bsc#1082635 bsc#1123034).
- scsi: storvsc: setup 1:1 mapping between hardware queue and CPU queue (bsc#1140729).
- sctp: Fix the link time qualifier of 'sctp_ctrlsock_exit()' (networking-stable-19_09_15).
- sctp: use transport pf_retrans in sctp_do_8_2_transport_strike (networking-stable-19_09_15).
- Sign non-x86 kernels when possible (boo#1134303)
- skge: fix checksum byte order (networking-stable-19_09_30).
- sock_diag: fix autoloading of the raw_diag module (bsc#1152791).
- sock_diag: request _diag module only when the family or proto has been registered (bsc#1152791).
- staging: bcm2835-audio: Fix draining behavior regression (bsc#1111666).
- staging: vt6655: Fix memory leak in vt6655_probe (bsc#1051510).
- staging: wlan-ng: fix exit return when sme->key_idx >= NUM_WEPKEYS (bsc#1051510).
- tcp: Do not dequeue SYN/FIN-segments from write-queue (git-gixes).
- tcp: fix tcp_ecn_withdraw_cwr() to clear TCP_ECN_QUEUE_CWR (networking-stable-19_09_15).
- tcp: inherit timestamp on mtu probe (networking-stable-19_09_05).
- tcp: remove empty skb from write queue in error cases (networking-stable-19_09_05).
- thermal: Fix use-after-free when unregistering thermal zone device (bsc#1051510).
- thermal_hwmon: Sanitize thermal_zone type (bsc#1051510).
- tipc: add NULL pointer check before calling kfree_rcu (networking-stable-19_09_15).
- tipc: fix unlimited bundling of small messages (networking-stable-19_10_05).
- tracing: Initialize iter->seq after zeroing in tracing_read_pipe() (bsc#1151508).
- tun: fix use-after-free when register netdev failed (networking-stable-19_09_15).
- tuntap: correctly set SOCKWQ_ASYNC_NOSPACE (bsc#1145099).
- Update patches.suse/NFSv4-Check-the-return-value-of-update_open_stateid.patch (boo#1154189 bsc#1154747).
- usb: adutux: fix NULL-derefs on disconnect (bsc#1142635).
- usb: adutux: fix use-after-free on disconnect (bsc#1142635).
- usb: adutux: fix use-after-free on release (bsc#1051510).
- usb: chaoskey: fix use-after-free on release (bsc#1051510).
- usb: dummy-hcd: fix power budget for SuperSpeed mode (bsc#1051510).
- usb: iowarrior: fix use-after-free after driver unbind (bsc#1051510).
- usb: iowarrior: fix use-after-free on disconnect (bsc#1051510).
- usb: iowarrior: fix use-after-free on release (bsc#1051510).
- usb: ldusb: fix memleak on disconnect (bsc#1051510).
- usb: ldusb: fix NULL-derefs on driver unbind (bsc#1051510).
- usb: ldusb: fix read info leaks (bsc#1051510).
- usb: legousbtower: fix a signedness bug in tower_probe() (bsc#1051510).
- usb: legousbtower: fix deadlock on disconnect (bsc#1142635).
- usb: legousbtower: fix memleak on disconnect (bsc#1051510).
- usb: legousbtower: fix open after failed reset request (bsc#1142635).
- usb: legousbtower: fix potential NULL-deref on disconnect (bsc#1142635).
- usb: legousbtower: fix slab info leak at probe (bsc#1142635).
- usb: legousbtower: fix use-after-free on release (bsc#1051510).
- usb: microtek: fix info-leak at probe (bsc#1142635).
- usbnet: ignore endpoints with invalid wMaxPacketSize (bsc#1051510).
- usbnet: sanity checking of packet sizes and device mtu (bsc#1051510).
- usb: serial: fix runtime PM after driver unbind (bsc#1051510).
- usb: serial: ftdi_sio: add device IDs for Sienna and Echelon PL-20 (bsc#1051510).
- usb: serial: keyspan: fix NULL-derefs on open() and write() (bsc#1051510).
- usb: serial: option: add support for Cinterion CLS8 devices (bsc#1051510).
- usb: serial: option: add Telit FN980 compositions (bsc#1051510).
- usb: serial: ti_usb_3410_5052: fix port-close races (bsc#1051510).
- usb: udc: lpc32xx: fix bad bit shift operation (bsc#1051510).
- usb: usblcd: fix I/O after disconnect (bsc#1142635).
- usb: usblp: fix runtime PM after driver unbind (bsc#1051510).
- usb: usblp: fix use-after-free on disconnect (bsc#1051510).
- usb: usb-skeleton: fix NULL-deref on disconnect (bsc#1051510).
- usb: usb-skeleton: fix runtime PM after driver unbind (bsc#1051510).
- usb: usb-skeleton: fix use-after-free after driver unbind (bsc#1051510).
- usb: xhci: wait for CNR controller not ready bit in xhci resume (bsc#1051510).
- usb: yurex: Do not retry on unexpected errors (bsc#1051510).
- usb: yurex: fix NULL-derefs on disconnect (bsc#1051510).
- vfio_pci: Restore original state on release (bsc#1051510).
- vhost_net: conditionally enable tx polling (bsc#1145099).
- video: of: display_timing: Add of_node_put() in of_get_display_timing() (bsc#1051510).
- vsock: Fix a lockdep warning in __vsock_release() (networking-stable-19_10_05).
- watchdog: imx2_wdt: fix min() calculation in imx2_wdt_set_timeout (bsc#1051510).
- x86/asm: Fix MWAITX C-state hint value (bsc#1114279).
- x86/boot/64: Make level2_kernel_pgt pages invalid outside kernel area (bnc#1153969).
- x86/boot/64: Round memory hole size up to next PMD page (bnc#1153969).
- x86/mm: Use WRITE_ONCE() when setting PTEs (bsc#1114279).
- xen/netback: fix error path of xenvif_connect_data() (bsc#1065600).
- xen/pv: Fix Xen PV guest int3 handling (bsc#1153811).
- xhci: Check all endpoints for LPM timeout (bsc#1051510).
- xhci: Fix false warning message about wrong bounce buffer write length (bsc#1051510).
- xhci: Increase STS_SAVE timeout in xhci_suspend() (bsc#1051510).
- xhci: Prevent device initiated U1/U2 link pm if exit latency is too long (bsc#1051510).
Patchnames
openSUSE-2019-2444
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel", "title": "Title of the patch" }, { "category": "description", "text": "\n\nThe openSUSE Leap 15.1 kernel was updated to receive various security and bugfixes.\n\nThe following security bugs were fixed:\n\n- CVE-2019-16995: A memory leak exits in hsr_dev_finalize() in net/hsr/hsr_device.c. if hsr_add_port fails to add a port, which may cause denial of service, aka CID-6caabe7f197d (bnc#1152685).\n- CVE-2019-16233: drivers/scsi/qla2xxx/qla_os.c did not check the alloc_workqueue return value, leading to a NULL pointer dereference (bnc#1150457).\n- CVE-2019-17666: rtl_p2p_noa_ie in drivers/net/wireless/realtek/rtlwifi/ps.c lacked a certain upper-bound check, leading to a buffer overflow (bnc#1154372).\n- CVE-2019-16232: drivers/net/wireless/marvell/libertas/if_sdio.c did not check the alloc_workqueue return value, leading to a NULL pointer dereference (bnc#1150465).\n- CVE-2019-16234: drivers/net/wireless/intel/iwlwifi/pcie/trans.c did not check the alloc_workqueue return value, leading to a NULL pointer dereference (bnc#1150452).\n- CVE-2019-17133: cfg80211_mgd_wext_giwessid in net/wireless/wext-sme.c did not reject a long SSID IE, leading to a Buffer Overflow (bnc#1153158).\n- CVE-2019-17056: llcp_sock_create in net/nfc/llcp_sock.c in the AF_NFC network module did not enforce CAP_NET_RAW, which means that unprivileged users can create a raw socket, aka CID-3a359798b176 (bnc#1152788).\n\nThe following non-security bugs were fixed:\n\n- 9p: avoid attaching writeback_fid on mmap with type PRIVATE (bsc#1051510).\n- ACPI / CPPC: do not require the _PSD method (bsc#1051510).\n- ACPI: CPPC: Set pcc_data[pcc_ss_id] to NULL in acpi_cppc_processor_exit() (bsc#1051510).\n- ACPI / processor: do not print errors for processorIDs == 0xff (bsc#1051510).\n- act_mirred: Fix mirred_init_module error handling (bsc#1051510).\n- Add Acer Aspire Ethos 8951G model quirk (bsc#1051510).\n- Add kernel module compression support (bsc#1135854)\n- ALSA: hda - Add a quirk model for fixing Huawei Matebook X right speaker (bsc#1051510).\n- ALSA: hda: Add Elkhart Lake PCI ID (bsc#1051510).\n- ALSA: hda - Add laptop imic fixup for ASUS M9V laptop (bsc#1051510).\n- ALSA: hda: Add support of Zhaoxin controller (bsc#1051510).\n- ALSA: hda: Add Tigerlake/Jasperlake PCI ID (bsc#1051510).\n- ALSA: hda - Apply AMD controller workaround for Raven platform (bsc#1051510).\n- ALSA: hda - Define a fallback_pin_fixup_tbl for alc269 family (bsc#1051510).\n- ALSA: hda - Drop unsol event handler for Intel HDMI codecs (bsc#1051510).\n- ALSA: hda - Expand pin_match function to match upcoming new tbls (bsc#1051510).\n- ALSA: hda: Flush interrupts on disabling (bsc#1051510).\n- ALSA: hda - Force runtime PM on Nvidia HDMI codecs (bsc#1051510).\n- ALSA: hda/hdmi - Do not report spurious jack state changes (bsc#1051510).\n- ALSA: hda/hdmi: remove redundant assignment to variable pcm_idx (bsc#1051510).\n- ALSA: hda - Inform too slow responses (bsc#1051510).\n- ALSA: hda/realtek - Add support for ALC711 (bsc#1051510).\n- ALSA: hda/realtek - Blacklist PC beep for Lenovo ThinkCentre M73/93 (bsc#1051510).\n- ALSA: hda/realtek - Check beep whitelist before assigning in all codecs (bsc#1051510).\n- ALSA: hda/realtek - Enable headset mic on Asus MJ401TA (bsc#1051510).\n- ALSA: hda/realtek - Fix alienware headset mic (bsc#1051510).\n- ALSA: hda/realtek - PCI quirk for Medion E4254 (bsc#1051510).\n- ALSA: hda/realtek: Reduce the Headphone static noise on XPS 9350/9360 (bsc#1051510).\n- ALSA: hda: Set fifo_size for both playback and capture streams (bsc#1051510).\n- ALSA: hda - Show the fatal CORB/RIRB error more clearly (bsc#1051510).\n- ALSA: hda/sigmatel - remove unused variable \u0027stac9200_core_init\u0027 (bsc#1051510).\n- ALSA: i2c: ak4xxx-adda: Fix a possible null pointer dereference in build_adc_controls() (bsc#1051510).\n- ALSA: line6: sizeof (byte) is always 1, use that fact (bsc#1051510).\n- ALSA: usb-audio: Add DSD support for EVGA NU Audio (bsc#1051510).\n- ALSA: usb-audio: Add Hiby device family to quirks for native DSD support (bsc#1051510).\n- ALSA: usb-audio: Add Pioneer DDJ-SX3 PCM quirck (bsc#1051510).\n- ALSA: usb-audio: Clean up check_input_term() (bsc#1051510).\n- ALSA: usb-audio: Disable quirks for BOSS Katana amplifiers (bsc#1051510).\n- ALSA: usb-audio: DSD auto-detection for Playback Designs (bsc#1051510).\n- ALSA: usb-audio: fix PCM device order (bsc#1051510).\n- ALSA: usb-audio: Fix possible NULL dereference at create_yamaha_midi_quirk() (bsc#1051510).\n- ALSA: usb-audio: More validations of descriptor units (bsc#1051510).\n- ALSA: usb-audio: remove some dead code (bsc#1051510).\n- ALSA: usb-audio: Remove superfluous bLength checks (bsc#1051510).\n- ALSA: usb-audio: Simplify parse_audio_unit() (bsc#1051510).\n- ALSA: usb-audio: Skip bSynchAddress endpoint check if it is invalid (bsc#1051510).\n- ALSA: usb-audio: Unify audioformat release code (bsc#1051510).\n- ALSA: usb-audio: Unify the release of usb_mixer_elem_info objects (bsc#1051510).\n- ALSA: usb-audio: Update DSD support quirks for Oppo and Rotel (bsc#1051510).\n- appletalk: enforce CAP_NET_RAW for raw sockets (bsc#1051510).\n- arcnet: provide a buffer big enough to actually receive packets (networking-stable-19_09_30).\n- ASoC: Define a set of DAPM pre/post-up events (bsc#1051510).\n- ASoC: dmaengine: Make the pcm-\u003ename equal to pcm-\u003eid if the name is not set (bsc#1051510).\n- ASoC: Intel: Fix use of potentially uninitialized variable (bsc#1051510).\n- ASoC: Intel: NHLT: Fix debug print format (bsc#1051510).\n- ASoc: rockchip: i2s: Fix RPM imbalance (bsc#1051510).\n- ASoC: rsnd: Reinitialize bit clock inversion flag for every format setting (bsc#1051510).\n- ASoC: sgtl5000: Fix charge pump source assignment (bsc#1051510).\n- auxdisplay: panel: need to delete scan_timer when misc_register fails in panel_attach (bsc#1051510).\n- ax25: enforce CAP_NET_RAW for raw sockets (bsc#1051510).\n- Blacklist \u0027signal: Correct namespace fixups of si_pid and si_uid\u0027 (bsc#1142667)\n- blk-wbt: abstract out end IO completion handler (bsc#1135873).\n- blk-wbt: fix has-sleeper queueing check (bsc#1135873).\n- blk-wbt: improve waking of tasks (bsc#1135873).\n- blk-wbt: move disable check into get_limit() (bsc#1135873).\n- blk-wbt: use wq_has_sleeper() for wq active check (bsc#1135873).\n- block: add io timeout to sysfs (bsc#1148410).\n- block: add io timeout to sysfs (bsc#1148410).\n- block: do not show io_timeout if driver has no timeout handler (bsc#1148410).\n- block: do not show io_timeout if driver has no timeout handler (bsc#1148410).\n- bluetooth: btrtl: Additional Realtek 8822CE Bluetooth devices (bsc#1051510).\n- bnx2x: Fix VF\u0027s VLAN reconfiguration in reload (bsc#1086323 ).\n- bnxt_en: Add PCI IDs for 57500 series NPAR devices (bsc#1153607).\n- bpf: fix use after free in prog symbol exposure (bsc#1083647).\n- bridge/mdb: remove wrong use of NLM_F_MULTI (networking-stable-19_09_15).\n- btrfs: bail out gracefully rather than BUG_ON (bsc#1153646).\n- btrfs: block-group: Fix a memory leak due to missing btrfs_put_block_group() (bsc#1155178).\n- btrfs: check for the full sync flag while holding the inode lock during fsync (bsc#1153713).\n- btrfs: Ensure btrfs_init_dev_replace_tgtdev sees up to date values (bsc#1154651).\n- btrfs: Ensure replaced device does not have pending chunk allocation (bsc#1154607).\n- btrfs: qgroup: Always free PREALLOC META reserve in btrfs_delalloc_release_extents() (bsc#1155179).\n- btrfs: remove wrong use of volume_mutex from btrfs_dev_replace_start (bsc#1154651).\n- btrfs: tracepoints: Fix bad entry members of qgroup events (bsc#1155186).\n- btrfs: tracepoints: Fix wrong parameter order for qgroup events (bsc#1155184).\n- can: mcp251x: mcp251x_hw_reset(): allow more time after a reset (bsc#1051510).\n- can: xilinx_can: xcan_probe(): skip error message on deferred probe (bsc#1051510).\n- cdc_ether: fix rndis support for Mediatek based smartphones (networking-stable-19_09_15).\n- cdc_ncm: fix divide-by-zero caused by invalid wMaxPacketSize (bsc#1051510).\n- ceph: fix directories inode i_blkbits initialization (bsc#1153717).\n- ceph: reconnect connection if session hang in opening state (bsc#1153718).\n- ceph: update the mtime when truncating up (bsc#1153719).\n- cfg80211: add and use strongly typed element iteration macros (bsc#1051510).\n- cfg80211: Purge frame registrations on iftype change (bsc#1051510).\n- clk: at91: select parent if main oscillator or bypass is enabled (bsc#1051510).\n- clk: qoriq: Fix -Wunused-const-variable (bsc#1051510).\n- clk: sirf: Do not reference clk_init_data after registration (bsc#1051510).\n- clk: zx296718: Do not reference clk_init_data after registration (bsc#1051510).\n- crypto: af_alg - consolidation of duplicate code (bsc#1154737).\n- crypto: af_alg - fix race accessing cipher request (bsc#1154737).\n- crypto: af_alg - Fix race around ctx-\u003ercvused by making it atomic_t (bsc#1154737).\n- crypto: af_alg - Initialize sg_num_bytes in error code path (bsc#1051510).\n- crypto: af_alg - remove locking in async callback (bsc#1154737).\n- crypto: af_alg - update correct dst SGL entry (bsc#1051510).\n- crypto: af_alg - wait for data at beginning of recvmsg (bsc#1154737).\n- crypto: algif_aead - copy AAD from src to dst (bsc#1154737).\n- crypto: algif_aead - fix reference counting of null skcipher (bsc#1154737).\n- crypto: algif_aead - overhaul memory management (bsc#1154737).\n- crypto: algif_aead - skip SGL entries with NULL page (bsc#1154737).\n- crypto: algif - return error code when no data was processed (bsc#1154737).\n- crypto: algif_skcipher - overhaul memory management (bsc#1154737).\n- crypto: talitos - fix missing break in switch statement (bsc#1142635).\n- cxgb4: do not dma memory off of the stack (bsc#1152790).\n- cxgb4: fix endianness for vlan value in cxgb4_tc_flower (bsc#1064802 bsc#1066129).\n- cxgb4:Fix out-of-bounds MSI-X info array access (networking-stable-19_10_05).\n- cxgb4: offload VLAN flows regardless of VLAN ethtype (bsc#1064802 bsc#1066129).\n- cxgb4: reduce kernel stack usage in cudbg_collect_mem_region() (bsc#1073513).\n- cxgb4: Signedness bug in init_one() (bsc#1097585 bsc#1097586 bsc#1097587 bsc#1097588 bsc#1097583 bsc#1097584).\n- cxgb4: smt: Add lock for atomic_dec_and_test (bsc#1064802 bsc#1066129).\n- dasd_fba: Display \u002700000000\u0027 for zero page when dumping sense\n- /dev/mem: Bail out upon SIGKILL (git-fixes).\n- drm: add __user attribute to ptr_to_compat() (bsc#1111666).\n- drm/amd/display: fix issue where 252-255 values are clipped (bsc#1111666).\n- drm/amd/display: reprogram VM config when system resume (bsc#1111666).\n- drm/amd/display: Restore backlight brightness after system resume (bsc#1112178)\n- drm/amd/display: support spdif (bsc#1111666).\n- drm/amd/dm: Understand why attaching path/tile properties are needed (bsc#1111666).\n- drm/amdgpu: Check for valid number of registers to read (bsc#1051510).\n- drm/amdgpu: Fix KFD-related kernel oops on Hawaii (bsc#1111666).\n- drm/amdgpu/gfx9: Update gfx9 golden settings (bsc#1111666).\n- drm/amdgpu/si: fix ASIC tests (git-fixes).\n- drm/amdgpu: Update gc_9_0 golden settings (bsc#1111666).\n- drm/amdkfd: Add missing Polaris10 ID (bsc#1111666).\n- drm/amd/powerplay/smu7: enforce minimal VBITimeout (v2) (bsc#1051510).\n- drm/amd/pp: Fix truncated clock value when set watermark (bsc#1111666).\n- drm/ast: Fixed reboot test may cause system hanged (bsc#1051510).\n- drm/atomic_helper: Allow DPMS On\u003c-\u003eOff changes for unregistered connectors (bsc#1111666).\n- drm/atomic_helper: Disallow new modesets on unregistered connectors (bsc#1111666).\n- drm/atomic_helper: Stop modesets on unregistered connectors harder (bsc#1111666).\n- drm/bridge: tc358767: Increase AUX transfer length limit (bsc#1051510).\n- drm/bridge: tfp410: fix memleak in get_modes() (bsc#1111666).\n- drm/edid: Add 6 bpc quirk for SDC panel in Lenovo G50 (bsc#1051510).\n- drm: Flush output polling on shutdown (bsc#1051510).\n- drm/i915: Cleanup gt powerstate from gem (bsc#1111666).\n- drm/i915: Fix intel_dp_mst_best_encoder() (bsc#1111666).\n- drm/i915/gvt: update vgpu workload head pointer correctly (bsc#1112178)\n- drm/i915: Restore sane defaults for KMS on GEM error load (bsc#1111666).\n- drm/mediatek: set DMA max segment size (bsc#1111666).\n- drm/msm/dsi: Fix return value check for clk_get_parent (bsc#1111666).\n- drm/msm/dsi: Implement reset correctly (bsc#1051510).\n- drm/nouveau/disp/nv50-: fix center/aspect-corrected scaling (bsc#1111666).\n- drm/nouveau/kms/nv50-: Do not create MSTMs for eDP connectors (bsc#1112178)\n- drm/nouveau/volt: Fix for some cards having 0 maximum voltage (bsc#1111666).\n- drm/omap: fix max fclk divider for omap36xx (bsc#1111666).\n- drm/panel: check failure cases in the probe func (bsc#1111666).\n- drm/panel: make drm_panel.h self-contained (bsc#1111666).\n- drm: panel-orientation-quirks: Add extra quirk table entry for GPD MicroPC (bsc#1111666).\n- drm/panel: simple: fix AUO g185han01 horizontal blanking (bsc#1051510).\n- drm/radeon: Bail earlier when radeon.cik_/si_support=0 is passed (bsc#1111666).\n- drm/radeon: Fix EEH during kexec (bsc#1051510).\n- drm: rcar-du: lvds: Fix bridge_to_rcar_lvds (bsc#1111666).\n- drm/rockchip: Check for fast link training before enabling psr (bsc#1111666).\n- drm/stm: attach gem fence to atomic state (bsc#1111666).\n- drm/tilcdc: Register cpufreq notifier after we have initialized crtc (bsc#1051510).\n- drm/vmwgfx: Fix double free in vmw_recv_msg() (bsc#1051510).\n- e1000e: add workaround for possible stalled packet (bsc#1051510).\n- efi/arm: Show SMBIOS bank/device location in CPER and GHES error logs (bsc#1152033).\n- efi: cper: print AER info of PCIe fatal error (bsc#1051510).\n- efi/memattr: Do not bail on zero VA if it equals the region\u0027s PA (bsc#1051510).\n- efivar/ssdt: Do not iterate over EFI vars if no SSDT override was specified (bsc#1051510).\n- firmware: dmi: Fix unlikely out-of-bounds read in save_mem_devices (git-fixes).\n- Fix AMD IOMMU kABI (bsc#1154610).\n- Fix KVM kABI after x86 mmu backports (bsc#1117665).\n- gpu: drm: radeon: Fix a possible null-pointer dereference in radeon_connector_set_property() (bsc#1051510).\n- HID: apple: Fix stuck function keys when using FN (bsc#1051510).\n- HID: fix error message in hid_open_report() (bsc#1051510).\n- HID: hidraw: Fix invalid read in hidraw_ioctl (bsc#1051510).\n- HID: logitech: Fix general protection fault caused by Logitech driver (bsc#1051510).\n- HID: logitech-hidpp: do all FF cleanup in hidpp_ff_destroy() (bsc#1051510).\n- HID: prodikeys: Fix general protection fault during probe (bsc#1051510).\n- HID: sony: Fix memory corruption issue on cleanup (bsc#1051510).\n- hso: fix NULL-deref on tty open (bsc#1051510).\n- hwmon: (acpi_power_meter) Change log level for \u0027unsafe software power cap\u0027 (bsc#1051510).\n- hwrng: core - do not wait on add_early_randomness() (git-fixes).\n- i2c: riic: Clear NACK in tend isr (bsc#1051510).\n- IB/core, ipoib: Do not overreact to SM LID change event (bsc#1154108)\n- IB/hfi1: Remove overly conservative VM_EXEC flag check (bsc#1144449).\n- IB/mlx5: Consolidate use_umr checks into single function (bsc#1093205).\n- IB/mlx5: Fix MR re-registration flow to use UMR properly (bsc#1093205).\n- IB/mlx5: Report correctly tag matching rendezvous capability (bsc#1046305).\n- ieee802154: atusb: fix use-after-free at disconnect (bsc#1051510).\n- ieee802154: ca8210: prevent memory leak (bsc#1051510).\n- ieee802154: enforce CAP_NET_RAW for raw sockets (bsc#1051510).\n- iio: adc: ad799x: fix probe error handling (bsc#1051510).\n- iio: light: opt3001: fix mutex unlock race (bsc#1051510).\n- ima: always return negative code for error (bsc#1051510).\n- Input: da9063 - fix capability and drop KEY_SLEEP (bsc#1051510).\n- Input: synaptics-rmi4 - avoid processing unknown IRQs (bsc#1051510).\n- iommu/amd: Apply the same IVRS IOAPIC workaround to Acer Aspire A315-41 (bsc#1137799).\n- iommu/amd: Check PM_LEVEL_SIZE() condition in locked section (bsc#1154608).\n- iommu/amd: Override wrong IVRS IOAPIC on Raven Ridge systems (bsc#1137799).\n- iommu/amd: Remove domain-\u003eupdated (bsc#1154610).\n- iommu/amd: Wait for completion of IOTLB flush in attach_device (bsc#1154611).\n- ipmi_si: Only schedule continuously in the thread in maintenance mode (bsc#1051510).\n- ipv6: drop incoming packets having a v4mapped source address (networking-stable-19_10_05).\n- ipv6: Fix the link time qualifier of \u0027ping_v6_proc_exit_net()\u0027 (networking-stable-19_09_15).\n- ipv6: Handle missing host route in __ipv6_ifa_notify (networking-stable-19_10_05).\n- iwlwifi: pcie: fix memory leaks in iwl_pcie_ctxt_info_gen3_init (bsc#1111666).\n- ixgbe: Fix secpath usage for IPsec TX offload (bsc#1113994 bsc#1151807).\n- ixgbe: Prevent u8 wrapping of ITR value to something less than 10us (bsc#1101674).\n- ixgbe: sync the first fragment unconditionally (bsc#1133140).\n- kabi: net: sched: act_sample: fix psample group handling on overwrite (networking-stable-19_09_05).\n- kABI workaround for crypto/af_alg changes (bsc#1154737).\n- kABI workaround for drm_connector.registered type changes (bsc#1111666).\n- kABI workaround for snd_hda_pick_pin_fixup() changes (bsc#1051510).\n- kernel-binary.spec.in: Fix build of non-modular kernels (boo#1154578).\n- kernel-subpackage-build: create zero size ghost for uncompressed vmlinux (bsc#1154354).\n- kernel/sysctl.c: do not override max_threads provided by userspace (bnc#1150875).\n- ksm: cleanup stable_node chain collapse case (bnc#1144338).\n- ksm: fix use after free with merge_across_nodes = 0 (bnc#1144338).\n- ksm: introduce ksm_max_page_sharing per page deduplication limit (bnc#1144338).\n- ksm: optimize refile of stable_node_dup at the head of the chain (bnc#1144338).\n- ksm: swap the two output parameters of chain/chain_prune (bnc#1144338).\n- kvm: Convert kvm_lock to a mutex (bsc#1117665).\n- kvm: MMU: drop vcpu param in gpte_access (bsc#1117665).\n- kvm: PPC: Book3S HV: use smp_mb() when setting/clearing host_ipi flag (bsc#1061840).\n- kvm: x86: add tracepoints around __direct_map and FNAME(fetch) (bsc#1117665).\n- kvm: x86: adjust kvm_mmu_page member to save 8 bytes (bsc#1117665).\n- kvm: x86: change kvm_mmu_page_get_gfn BUG_ON to WARN_ON (bsc#1117665).\n- kvm: x86: Do not release the page inside mmu_set_spte() (bsc#1117665).\n- kvm: x86: make FNAME(fetch) and __direct_map more similar (bsc#1117665).\n- kvm: x86, powerpc: do not allow clearing largepages debugfs entry (bsc#1117665).\n- kvm: x86: remove now unneeded hugepage gfn adjustment (bsc#1117665).\n- libertas: Add missing sentinel at end of if_usb.c fw_table (bsc#1051510).\n- lib/mpi: Fix karactx leak in mpi_powm (bsc#1051510).\n- libnvdimm/security: provide fix for secure-erase to use zero-key (bsc#1149853).\n- lpfc: Add additional discovery log messages (bsc#1154521).\n- lpfc: Add FA-WWN Async Event reporting (bsc#1154521).\n- lpfc: Add FC-AL support to lpe32000 models (bsc#1154521).\n- lpfc: Add log macros to allow print by serverity or verbocity setting (bsc#1154521).\n- lpfc: Fix bad ndlp ptr in xri aborted handling (bsc#1154521).\n- lpfc: fix coverity error of dereference after null check (bsc#1154521).\n- lpfc: Fix hardlockup in lpfc_abort_handler (bsc#1154521).\n- lpfc: Fix lockdep errors in sli_ringtx_put (bsc#1154521).\n- lpfc: fix lpfc_nvmet_mrq to be bound by hdw queue count (bsc#1154521).\n- lpfc: Fix reporting of read-only fw error errors (bsc#1154521).\n- lpfc: Fix SLI3 hba in loop mode not discovering devices (bsc#1154521).\n- lpfc: Make FW logging dynamically configurable (bsc#1154521).\n- lpfc: Remove lock contention target write path (bsc#1154521).\n- lpfc: Revise interrupt coalescing for missing scenarios (bsc#1154521).\n- lpfc: Slight fast-path Performance optimizations (bsc#1154521).\n- lpfc: Update lpfc version to 12.6.0.0 (bsc#1154521).\n- mac80211: accept deauth frames in IBSS mode (bsc#1051510).\n- mac80211: fix txq null pointer dereference (bsc#1051510).\n- mac80211: Reject malformed SSID elements (bsc#1051510).\n- macsec: drop skb sk before calling gro_cells_receive (bsc#1051510).\n- media: atmel: atmel-isc: fix asd memory allocation (bsc#1135642).\n- media: cpia2_usb: fix memory leaks (bsc#1051510).\n- media: dvb-core: fix a memory leak bug (bsc#1051510).\n- media: exynos4-is: fix leaked of_node references (bsc#1051510).\n- media: gspca: zero usb_buf on error (bsc#1051510).\n- media: hdpvr: Add device num check and handling (bsc#1051510).\n- media: hdpvr: add terminating 0 at end of string (bsc#1051510).\n- media: i2c: ov5645: Fix power sequence (bsc#1051510).\n- media: iguanair: add sanity checks (bsc#1051510).\n- media: omap3isp: Do not set streaming state on random subdevs (bsc#1051510).\n- media: omap3isp: Set device on omap3isp subdevs (bsc#1051510).\n- media: ov9650: add a sanity check (bsc#1051510).\n- media: radio/si470x: kill urb on error (bsc#1051510).\n- media: saa7134: fix terminology around saa7134_i2c_eeprom_md7134_gate() (bsc#1051510).\n- media: saa7146: add cleanup in hexium_attach() (bsc#1051510).\n- media: sn9c20x: Add MSI MS-1039 laptop to flip_dmi_table (bsc#1051510).\n- media: stkwebcam: fix runtime PM after driver unbind (bsc#1051510).\n- media: ttusb-dec: Fix info-leak in ttusb_dec_send_command() (bsc#1051510).\n- memstick: jmb38x_ms: Fix an error handling path in \u0027jmb38x_ms_probe()\u0027 (bsc#1051510).\n- mfd: intel-lpss: Remove D3cold delay (bsc#1051510).\n- mISDN: enforce CAP_NET_RAW for raw sockets (bsc#1051510).\n- mld: fix memory leak in mld_del_delrec() (networking-stable-19_09_05).\n- mmc: sdhci: Fix incorrect switch to HS mode (bsc#1051510).\n- mmc: sdhci: improve ADMA error reporting (bsc#1051510).\n- mmc: sdhci-of-esdhc: set DMA snooping based on DMA coherence (bsc#1051510).\n- netfilter: nf_nat: do not bug when mapping already exists (bsc#1146612).\n- net: Fix null de-reference of device refcount (networking-stable-19_09_15).\n- net: fix skb use after free in netpoll (networking-stable-19_09_05).\n- net: gso: Fix skb_segment splat when splitting gso_size mangled skb having linear-headed frag_list (networking-stable-19_09_15).\n- net/ibmvnic: Fix EOI when running in XIVE mode (bsc#1089644, ltc#166495, ltc#165544, git-fixes).\n- net/mlx4_en: fix a memory leak bug (bsc#1046299).\n- net/mlx5: Add device ID of upcoming BlueField-2 (bsc#1046303 ).\n- net/mlx5: Fix error handling in mlx5_load() (bsc#1046305 ).\n- net/phy: fix DP83865 10 Mbps HDX loopback disable function (networking-stable-19_09_30).\n- net: qlogic: Fix memory leak in ql_alloc_large_buffers (networking-stable-19_10_05).\n- net: qrtr: Stop rx_worker before freeing node (networking-stable-19_09_30).\n- net/rds: Fix error handling in rds_ib_add_one() (networking-stable-19_10_05).\n- net/rds: fix warn in rds_message_alloc_sgs (bsc#1154848).\n- net/rds: remove user triggered WARN_ON in rds_sendmsg (bsc#1154848).\n- net: Replace NF_CT_ASSERT() with WARN_ON() (bsc#1146612).\n- net/sched: act_sample: do not push mac header on ip6gre ingress (networking-stable-19_09_30).\n- net: sched: act_sample: fix psample group handling on overwrite (networking-stable-19_09_05).\n- net_sched: add policy validation for action attributes (networking-stable-19_09_30).\n- net_sched: fix backward compatibility for TCA_ACT_KIND (git-fixes).\n- net: stmmac: dwmac-rk: Do not fail if phy regulator is absent (networking-stable-19_09_05).\n- net: Unpublish sk from sk_reuseport_cb before call_rcu (networking-stable-19_10_05).\n- nfc: fix attrs checks in netlink interface (bsc#1051510).\n- nfc: fix memory leak in llcp_sock_bind() (bsc#1051510).\n- nfc: pn533: fix use-after-free and memleaks (bsc#1051510).\n- NFSv4.1 - backchannel request should hold ref on xprt (bsc#1152624).\n- nl80211: fix null pointer dereference (bsc#1051510).\n- objtool: Clobber user CFLAGS variable (bsc#1153236).\n- openvswitch: change type of UPCALL_PID attribute to NLA_UNSPEC (networking-stable-19_09_30).\n- packaging: add support for riscv64\n- PCI: Correct pci=resource_alignment parameter example (bsc#1051510).\n- PCI: dra7xx: Fix legacy INTD IRQ handling (bsc#1087092).\n- PCI: hv: Use bytes 4 and 5 from instance ID as the PCI domain numbers (bsc#1153263).\n- PCI: PM: Fix pci_power_up() (bsc#1051510).\n- pinctrl: cherryview: restore Strago DMI workaround for all versions (bsc#1111666).\n- pinctrl: tegra: Fix write barrier placement in pmx_writel (bsc#1051510).\n- platform/x86: classmate-laptop: remove unused variable (bsc#1051510).\n- platform/x86: i2c-multi-instantiate: Derive the device name from parent (bsc#1111666).\n- platform/x86: i2c-multi-instantiate: Fail the probe if no IRQ provided (bsc#1111666).\n- platform/x86: pmc_atom: Add Siemens SIMATIC IPC277E to critclk_systems DMI table (bsc#1051510).\n- powerpc/64s/pseries: radix flush translations before MMU is enabled at boot (bsc#1055186).\n- powerpc/64s/radix: keep kernel ERAT over local process/guest invalidates (bsc#1055186).\n- powerpc/64s/radix: tidy up TLB flushing code (bsc#1055186).\n- powerpc/64s: Rename PPC_INVALIDATE_ERAT to PPC_ISA_3_0_INVALIDATE_ERAT (bsc#1055186).\n- powerpc/mm/book3s64: Move book3s64 code to pgtable-book3s64 (bsc#1055186).\n- powerpc/mm: mark more tlb functions as __always_inline (bsc#1055186).\n- powerpc/mm: Properly invalidate when setting process table base (bsc#1055186).\n- powerpc/mm/radix: mark as __tlbie_pid() and friends as__always_inline (bsc#1055186).\n- powerpc/mm/radix: mark __radix__flush_tlb_range_psize() as __always_inline (bsc#1055186).\n- powerpc/pseries/mobility: use cond_resched when updating device tree (bsc#1153112 ltc#181778).\n- powerpc/pseries: Remove confusing warning message (bsc#1109158).\n- powerpc/rtas: allow rescheduling while changing cpu states (bsc#1153112 ltc#181778).\n- powerplay: Respect units on max dcfclk watermark (bsc#1111666).\n- power: supply: sysfs: ratelimit property read error message (bsc#1051510).\n- qed: iWARP - Fix default window size to be based on chip (bsc#1050536 bsc#1050545).\n- qed: iWARP - Fix tc for MPA ll2 connection (bsc#1050536 bsc#1050545).\n- qed: iWARP - fix uninitialized callback (bsc#1050536 bsc#1050545).\n- qed: iWARP - Use READ_ONCE and smp_store_release to access ep-\u003estate (bsc#1050536 bsc#1050545).\n- qmi_wwan: add support for Cinterion CLS8 devices (networking-stable-19_10_05).\n- r8152: Set macpassthru in reset_resume callback (bsc#1051510).\n- RDMA/bnxt_re: Fix spelling mistake \u0027missin_resp\u0027 -\u003e \u0027missing_resp\u0027 (bsc#1050244).\n- RDMA: Fix goto target to release the allocated memory (bsc#1050244).\n- rds: Fix warning (bsc#1154848).\n- Revert \u0027drm/amd/display: Fix underscan not using proper scaling\u0027 (bsc#1111666).\n- Revert \u0027drm/amd/powerplay: Enable/Disable NBPSTATE on On/OFF of UVD\u0027 (bsc#1111666).\n- Revert \u0027drm/radeon: Fix EEH during kexec\u0027 (bsc#1051510).\n- rtlwifi: rtl8192cu: Fix value set in descriptor (bsc#1142635).\n- s390/cmf: set_schib_wait add timeout (bsc#1153509, bsc#1153476).\n- s390/crypto: fix gcm-aes-s390 selftest failures (bsc#1137861 LTC#178091).\n- sch_cbq: validate TCA_CBQ_WRROPT to avoid crash (networking-stable-19_10_05).\n- sch_dsmark: fix potential NULL deref in dsmark_init() (networking-stable-19_10_05).\n- sch_hhf: ensure quantum and hhf_non_hh_weight are non-zero (networking-stable-19_09_15).\n- sch_netem: fix a divide by zero in tabledist() (networking-stable-19_09_30).\n- scsi: lpfc: Check queue pointer before use (bsc#1154242).\n- scsi: lpfc: cleanup: remove unused fcp_txcmlpq_cnt (bsc#1154521).\n- scsi: lpfc: Complete removal of FCoE T10 PI support on SLI-4 adapters (bsc#1154521).\n- scsi: lpfc: Convert existing %pf users to %ps (bsc#1154521).\n- scsi: lpfc: Fix coverity errors on NULL pointer checks (bsc#1154521).\n- scsi: lpfc: Fix device recovery errors after PLOGI failures (bsc#1154521).\n- scsi: lpfc: Fix devices that do not return after devloss followed by rediscovery (bsc#1137040).\n- scsi: lpfc: Fix discovery failures when target device connectivity bounces (bsc#1154521).\n- scsi: lpfc: Fix GPF on scsi command completion (bsc#1154521).\n- scsi: lpfc: Fix hdwq sgl locks and irq handling (bsc#1154521).\n- scsi: lpfc: Fix host hang at boot or slow boot (bsc#1154521).\n- scsi: lpfc: Fix list corruption detected in lpfc_put_sgl_per_hdwq (bsc#1154521).\n- scsi: lpfc: Fix list corruption in lpfc_sli_get_iocbq (bsc#1154521).\n- scsi: lpfc: Fix locking on mailbox command completion (bsc#1154521).\n- scsi: lpfc: Fix miss of register read failure check (bsc#1154521).\n- scsi: lpfc: Fix null ptr oops updating lpfc_devloss_tmo via sysfs attribute (bsc#1140845).\n- scsi: lpfc: Fix NVMe ABTS in response to receiving an ABTS (bsc#1154521).\n- scsi: lpfc: Fix NVME io abort failures causing hangs (bsc#1154521).\n- scsi: lpfc: Fix premature re-enabling of interrupts in lpfc_sli_host_down (bsc#1154521).\n- scsi: lpfc: Fix propagation of devloss_tmo setting to nvme transport (bsc#1140883).\n- scsi: lpfc: Fix pt2pt discovery on SLI3 HBAs (bsc#1154521).\n- scsi: lpfc: Fix rpi release when deleting vport (bsc#1154521).\n- scsi: lpfc: Fix spinlock_irq issues in lpfc_els_flush_cmd() (bsc#1154521).\n- scsi: lpfc: Make function lpfc_defer_pt2pt_acc static (bsc#1154521).\n- scsi: lpfc: Remove bg debugfs buffers (bsc#1144375).\n- scsi: lpfc: remove left-over BUILD_NVME defines (bsc#1154268).\n- scsi: lpfc: Update async event logging (bsc#1154521).\n- scsi: lpfc: Update lpfc version to 12.4.0.1 (bsc#1154521).\n- scsi: qedf: fc_rport_priv reference counting fixes (bsc#1098291).\n- scsi: qedf: Modify abort and tmf handler to handle edge condition and flush (bsc#1098291).\n- scsi: qla2xxx: Add error handling for PLOGI ELS passthrough (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: Capture FW dump on MPI heartbeat stop event (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: Check for MB timeout while capturing ISP27/28xx FW dump (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: Dual FCP-NVMe target port support (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: Fix N2N link reset (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: Fix N2N link up fail (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: Fix stale mem access on driver unload (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: Fix unbound sleep in fcport delete path (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: Fix wait condition in loop (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: Improve logging for scan thread (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: Optimize NPIV tear down process (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: remove redundant assignment to pointer host (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: Remove WARN_ON_ONCE in qla2x00_status_cont_entry() (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: Set remove flag for all VP (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: Silence fwdump template message (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: Update driver version to 10.01.00.20-k (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: storvsc: setup 1:1 mapping between hardware queue and CPU queue (bsc#1140729).\n- sctp: Fix the link time qualifier of \u0027sctp_ctrlsock_exit()\u0027 (networking-stable-19_09_15).\n- sctp: use transport pf_retrans in sctp_do_8_2_transport_strike (networking-stable-19_09_15).\n- Sign non-x86 kernels when possible (boo#1134303)\n- skge: fix checksum byte order (networking-stable-19_09_30).\n- sock_diag: fix autoloading of the raw_diag module (bsc#1152791).\n- sock_diag: request _diag module only when the family or proto has been registered (bsc#1152791).\n- staging: bcm2835-audio: Fix draining behavior regression (bsc#1111666).\n- staging: vt6655: Fix memory leak in vt6655_probe (bsc#1051510).\n- staging: wlan-ng: fix exit return when sme-\u003ekey_idx \u003e= NUM_WEPKEYS (bsc#1051510).\n- tcp: Do not dequeue SYN/FIN-segments from write-queue (git-gixes).\n- tcp: fix tcp_ecn_withdraw_cwr() to clear TCP_ECN_QUEUE_CWR (networking-stable-19_09_15).\n- tcp: inherit timestamp on mtu probe (networking-stable-19_09_05).\n- tcp: remove empty skb from write queue in error cases (networking-stable-19_09_05).\n- thermal: Fix use-after-free when unregistering thermal zone device (bsc#1051510).\n- thermal_hwmon: Sanitize thermal_zone type (bsc#1051510).\n- tipc: add NULL pointer check before calling kfree_rcu (networking-stable-19_09_15).\n- tipc: fix unlimited bundling of small messages (networking-stable-19_10_05).\n- tracing: Initialize iter-\u003eseq after zeroing in tracing_read_pipe() (bsc#1151508).\n- tun: fix use-after-free when register netdev failed (networking-stable-19_09_15).\n- tuntap: correctly set SOCKWQ_ASYNC_NOSPACE (bsc#1145099).\n- Update patches.suse/NFSv4-Check-the-return-value-of-update_open_stateid.patch (boo#1154189 bsc#1154747).\n- usb: adutux: fix NULL-derefs on disconnect (bsc#1142635).\n- usb: adutux: fix use-after-free on disconnect (bsc#1142635).\n- usb: adutux: fix use-after-free on release (bsc#1051510).\n- usb: chaoskey: fix use-after-free on release (bsc#1051510).\n- usb: dummy-hcd: fix power budget for SuperSpeed mode (bsc#1051510).\n- usb: iowarrior: fix use-after-free after driver unbind (bsc#1051510).\n- usb: iowarrior: fix use-after-free on disconnect (bsc#1051510).\n- usb: iowarrior: fix use-after-free on release (bsc#1051510).\n- usb: ldusb: fix memleak on disconnect (bsc#1051510).\n- usb: ldusb: fix NULL-derefs on driver unbind (bsc#1051510).\n- usb: ldusb: fix read info leaks (bsc#1051510).\n- usb: legousbtower: fix a signedness bug in tower_probe() (bsc#1051510).\n- usb: legousbtower: fix deadlock on disconnect (bsc#1142635).\n- usb: legousbtower: fix memleak on disconnect (bsc#1051510).\n- usb: legousbtower: fix open after failed reset request (bsc#1142635).\n- usb: legousbtower: fix potential NULL-deref on disconnect (bsc#1142635).\n- usb: legousbtower: fix slab info leak at probe (bsc#1142635).\n- usb: legousbtower: fix use-after-free on release (bsc#1051510).\n- usb: microtek: fix info-leak at probe (bsc#1142635).\n- usbnet: ignore endpoints with invalid wMaxPacketSize (bsc#1051510).\n- usbnet: sanity checking of packet sizes and device mtu (bsc#1051510).\n- usb: serial: fix runtime PM after driver unbind (bsc#1051510).\n- usb: serial: ftdi_sio: add device IDs for Sienna and Echelon PL-20 (bsc#1051510).\n- usb: serial: keyspan: fix NULL-derefs on open() and write() (bsc#1051510).\n- usb: serial: option: add support for Cinterion CLS8 devices (bsc#1051510).\n- usb: serial: option: add Telit FN980 compositions (bsc#1051510).\n- usb: serial: ti_usb_3410_5052: fix port-close races (bsc#1051510).\n- usb: udc: lpc32xx: fix bad bit shift operation (bsc#1051510).\n- usb: usblcd: fix I/O after disconnect (bsc#1142635).\n- usb: usblp: fix runtime PM after driver unbind (bsc#1051510).\n- usb: usblp: fix use-after-free on disconnect (bsc#1051510).\n- usb: usb-skeleton: fix NULL-deref on disconnect (bsc#1051510).\n- usb: usb-skeleton: fix runtime PM after driver unbind (bsc#1051510).\n- usb: usb-skeleton: fix use-after-free after driver unbind (bsc#1051510).\n- usb: xhci: wait for CNR controller not ready bit in xhci resume (bsc#1051510).\n- usb: yurex: Do not retry on unexpected errors (bsc#1051510).\n- usb: yurex: fix NULL-derefs on disconnect (bsc#1051510).\n- vfio_pci: Restore original state on release (bsc#1051510).\n- vhost_net: conditionally enable tx polling (bsc#1145099).\n- video: of: display_timing: Add of_node_put() in of_get_display_timing() (bsc#1051510).\n- vsock: Fix a lockdep warning in __vsock_release() (networking-stable-19_10_05).\n- watchdog: imx2_wdt: fix min() calculation in imx2_wdt_set_timeout (bsc#1051510).\n- x86/asm: Fix MWAITX C-state hint value (bsc#1114279).\n- x86/boot/64: Make level2_kernel_pgt pages invalid outside kernel area (bnc#1153969).\n- x86/boot/64: Round memory hole size up to next PMD page (bnc#1153969).\n- x86/mm: Use WRITE_ONCE() when setting PTEs (bsc#1114279).\n- xen/netback: fix error path of xenvif_connect_data() (bsc#1065600).\n- xen/pv: Fix Xen PV guest int3 handling (bsc#1153811).\n- xhci: Check all endpoints for LPM timeout (bsc#1051510).\n- xhci: Fix false warning message about wrong bounce buffer write length (bsc#1051510).\n- xhci: Increase STS_SAVE timeout in xhci_suspend() (bsc#1051510).\n- xhci: Prevent device initiated U1/U2 link pm if exit latency is too long (bsc#1051510).\n", "title": "Description of the patch" }, { "category": "details", "text": "openSUSE-2019-2444", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2019_2444-1.json" }, { "category": "self", "summary": "URL for openSUSE-SU-2019:2444-1", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NDCZ4VF2YAQG5WJDX6YMBFF67X36UMPN/#NDCZ4VF2YAQG5WJDX6YMBFF67X36UMPN" }, { "category": "self", "summary": "E-Mail link for openSUSE-SU-2019:2444-1", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NDCZ4VF2YAQG5WJDX6YMBFF67X36UMPN/#NDCZ4VF2YAQG5WJDX6YMBFF67X36UMPN" }, { "category": "self", "summary": "SUSE Bug 1046299", "url": "https://bugzilla.suse.com/1046299" }, { "category": "self", "summary": "SUSE Bug 1046303", "url": "https://bugzilla.suse.com/1046303" }, { "category": "self", "summary": "SUSE Bug 1046305", "url": "https://bugzilla.suse.com/1046305" }, { "category": "self", "summary": "SUSE Bug 1050244", "url": "https://bugzilla.suse.com/1050244" }, { "category": "self", "summary": "SUSE Bug 1050536", "url": "https://bugzilla.suse.com/1050536" }, { "category": "self", "summary": "SUSE Bug 1050545", "url": "https://bugzilla.suse.com/1050545" }, { "category": "self", "summary": "SUSE Bug 1051510", "url": "https://bugzilla.suse.com/1051510" }, { "category": "self", "summary": "SUSE Bug 1055186", "url": "https://bugzilla.suse.com/1055186" }, { "category": "self", "summary": "SUSE Bug 1061840", "url": "https://bugzilla.suse.com/1061840" }, { "category": "self", "summary": "SUSE Bug 1064802", "url": "https://bugzilla.suse.com/1064802" }, { "category": "self", "summary": "SUSE Bug 1065600", "url": "https://bugzilla.suse.com/1065600" }, { "category": "self", "summary": "SUSE Bug 1066129", "url": "https://bugzilla.suse.com/1066129" }, { "category": "self", "summary": "SUSE Bug 1073513", "url": "https://bugzilla.suse.com/1073513" }, { "category": "self", "summary": "SUSE Bug 1082635", "url": "https://bugzilla.suse.com/1082635" }, { "category": "self", "summary": "SUSE Bug 1083647", "url": "https://bugzilla.suse.com/1083647" }, { "category": "self", "summary": "SUSE Bug 1086323", "url": "https://bugzilla.suse.com/1086323" }, { "category": "self", "summary": "SUSE Bug 1087092", "url": "https://bugzilla.suse.com/1087092" }, { "category": "self", "summary": "SUSE Bug 1089644", "url": "https://bugzilla.suse.com/1089644" }, { "category": "self", "summary": "SUSE Bug 1093205", "url": "https://bugzilla.suse.com/1093205" }, { "category": "self", "summary": "SUSE Bug 1097583", "url": "https://bugzilla.suse.com/1097583" }, { "category": "self", "summary": "SUSE Bug 1097584", "url": "https://bugzilla.suse.com/1097584" }, { "category": "self", "summary": "SUSE Bug 1097585", "url": "https://bugzilla.suse.com/1097585" }, { "category": "self", "summary": "SUSE Bug 1097586", "url": "https://bugzilla.suse.com/1097586" }, { "category": "self", "summary": "SUSE Bug 1097587", "url": "https://bugzilla.suse.com/1097587" }, { "category": "self", "summary": "SUSE Bug 1097588", "url": "https://bugzilla.suse.com/1097588" }, { "category": "self", "summary": "SUSE Bug 1098291", "url": "https://bugzilla.suse.com/1098291" }, { "category": "self", "summary": "SUSE Bug 1101674", "url": "https://bugzilla.suse.com/1101674" }, { "category": "self", "summary": "SUSE Bug 1109158", "url": "https://bugzilla.suse.com/1109158" }, { "category": "self", "summary": "SUSE Bug 1111666", "url": "https://bugzilla.suse.com/1111666" }, { "category": "self", "summary": "SUSE Bug 1112178", "url": "https://bugzilla.suse.com/1112178" }, { "category": "self", "summary": "SUSE Bug 1113994", "url": "https://bugzilla.suse.com/1113994" }, { "category": "self", "summary": "SUSE Bug 1114279", "url": "https://bugzilla.suse.com/1114279" }, { "category": "self", "summary": "SUSE Bug 1117665", "url": "https://bugzilla.suse.com/1117665" }, { "category": "self", "summary": "SUSE Bug 1123034", "url": "https://bugzilla.suse.com/1123034" }, { "category": "self", "summary": "SUSE Bug 1123080", "url": "https://bugzilla.suse.com/1123080" }, { "category": "self", "summary": "SUSE Bug 1133140", "url": "https://bugzilla.suse.com/1133140" }, { "category": "self", "summary": "SUSE Bug 1134303", "url": "https://bugzilla.suse.com/1134303" }, { "category": "self", "summary": "SUSE Bug 1135642", "url": "https://bugzilla.suse.com/1135642" }, { "category": "self", "summary": "SUSE Bug 1135854", "url": "https://bugzilla.suse.com/1135854" }, { "category": "self", "summary": "SUSE Bug 1135873", "url": "https://bugzilla.suse.com/1135873" }, { "category": "self", "summary": "SUSE Bug 1137040", "url": "https://bugzilla.suse.com/1137040" }, { "category": "self", "summary": "SUSE Bug 1137799", "url": "https://bugzilla.suse.com/1137799" }, { "category": "self", "summary": "SUSE Bug 1137861", "url": "https://bugzilla.suse.com/1137861" }, { "category": "self", "summary": "SUSE Bug 1140729", "url": "https://bugzilla.suse.com/1140729" }, { "category": "self", "summary": "SUSE Bug 1140845", "url": "https://bugzilla.suse.com/1140845" }, { "category": "self", "summary": "SUSE Bug 1140883", "url": "https://bugzilla.suse.com/1140883" }, { "category": "self", "summary": "SUSE Bug 1141600", "url": "https://bugzilla.suse.com/1141600" }, { "category": "self", "summary": "SUSE Bug 1142635", "url": "https://bugzilla.suse.com/1142635" }, { "category": "self", "summary": "SUSE Bug 1142667", "url": "https://bugzilla.suse.com/1142667" }, { "category": "self", "summary": "SUSE Bug 1143706", "url": "https://bugzilla.suse.com/1143706" }, { "category": "self", "summary": "SUSE Bug 1144338", "url": "https://bugzilla.suse.com/1144338" }, { "category": "self", "summary": "SUSE Bug 1144375", "url": "https://bugzilla.suse.com/1144375" }, { "category": "self", "summary": "SUSE Bug 1144449", "url": "https://bugzilla.suse.com/1144449" }, { "category": "self", "summary": "SUSE Bug 1145099", "url": "https://bugzilla.suse.com/1145099" }, { "category": "self", "summary": "SUSE Bug 1146612", "url": "https://bugzilla.suse.com/1146612" }, { "category": "self", "summary": "SUSE Bug 1148410", "url": "https://bugzilla.suse.com/1148410" }, { "category": "self", "summary": "SUSE Bug 1149853", "url": "https://bugzilla.suse.com/1149853" }, { "category": "self", "summary": "SUSE Bug 1150452", "url": "https://bugzilla.suse.com/1150452" }, { "category": "self", "summary": "SUSE Bug 1150457", "url": "https://bugzilla.suse.com/1150457" }, { "category": "self", "summary": "SUSE Bug 1150465", "url": "https://bugzilla.suse.com/1150465" }, { "category": "self", "summary": "SUSE Bug 1150875", "url": "https://bugzilla.suse.com/1150875" }, { "category": "self", "summary": "SUSE Bug 1151508", "url": "https://bugzilla.suse.com/1151508" }, { "category": "self", "summary": "SUSE Bug 1151807", "url": "https://bugzilla.suse.com/1151807" }, { "category": "self", "summary": "SUSE Bug 1152033", "url": "https://bugzilla.suse.com/1152033" }, { "category": "self", "summary": "SUSE Bug 1152624", "url": "https://bugzilla.suse.com/1152624" }, { "category": "self", "summary": "SUSE Bug 1152685", "url": "https://bugzilla.suse.com/1152685" }, { "category": "self", "summary": "SUSE Bug 1152788", "url": "https://bugzilla.suse.com/1152788" }, { "category": "self", "summary": "SUSE Bug 1152790", "url": "https://bugzilla.suse.com/1152790" }, { "category": "self", "summary": "SUSE Bug 1152791", "url": "https://bugzilla.suse.com/1152791" }, { "category": "self", "summary": "SUSE Bug 1153112", "url": "https://bugzilla.suse.com/1153112" }, { "category": "self", "summary": "SUSE Bug 1153158", "url": "https://bugzilla.suse.com/1153158" }, { "category": "self", "summary": "SUSE Bug 1153236", "url": "https://bugzilla.suse.com/1153236" }, { "category": "self", "summary": "SUSE Bug 1153263", "url": "https://bugzilla.suse.com/1153263" }, { "category": "self", "summary": "SUSE Bug 1153476", "url": "https://bugzilla.suse.com/1153476" }, { "category": "self", "summary": "SUSE Bug 1153509", "url": "https://bugzilla.suse.com/1153509" }, { "category": "self", "summary": "SUSE Bug 1153607", "url": "https://bugzilla.suse.com/1153607" }, { "category": "self", "summary": "SUSE Bug 1153646", "url": "https://bugzilla.suse.com/1153646" }, { "category": "self", "summary": "SUSE Bug 1153713", "url": "https://bugzilla.suse.com/1153713" }, { "category": "self", "summary": "SUSE Bug 1153717", "url": "https://bugzilla.suse.com/1153717" }, { "category": "self", "summary": "SUSE Bug 1153718", "url": "https://bugzilla.suse.com/1153718" }, { "category": "self", "summary": "SUSE Bug 1153719", "url": "https://bugzilla.suse.com/1153719" }, { "category": "self", "summary": "SUSE Bug 1153811", "url": "https://bugzilla.suse.com/1153811" }, { "category": "self", "summary": "SUSE Bug 1153969", "url": "https://bugzilla.suse.com/1153969" }, { "category": "self", "summary": "SUSE Bug 1154108", "url": "https://bugzilla.suse.com/1154108" }, { "category": "self", "summary": "SUSE Bug 1154189", "url": "https://bugzilla.suse.com/1154189" }, { "category": "self", "summary": "SUSE Bug 1154242", "url": "https://bugzilla.suse.com/1154242" }, { "category": "self", "summary": "SUSE Bug 1154268", "url": "https://bugzilla.suse.com/1154268" }, { "category": "self", "summary": "SUSE Bug 1154354", "url": "https://bugzilla.suse.com/1154354" }, { "category": "self", "summary": "SUSE Bug 1154372", "url": "https://bugzilla.suse.com/1154372" }, { "category": "self", "summary": "SUSE Bug 1154521", "url": "https://bugzilla.suse.com/1154521" }, { "category": "self", "summary": "SUSE Bug 1154578", "url": "https://bugzilla.suse.com/1154578" }, { "category": "self", "summary": "SUSE Bug 1154607", "url": "https://bugzilla.suse.com/1154607" }, { "category": "self", "summary": "SUSE Bug 1154608", "url": "https://bugzilla.suse.com/1154608" }, { "category": "self", "summary": "SUSE Bug 1154610", "url": "https://bugzilla.suse.com/1154610" }, { "category": "self", "summary": "SUSE Bug 1154611", "url": "https://bugzilla.suse.com/1154611" }, { "category": "self", "summary": "SUSE Bug 1154651", "url": "https://bugzilla.suse.com/1154651" }, { "category": "self", "summary": "SUSE Bug 1154737", "url": "https://bugzilla.suse.com/1154737" }, { "category": "self", "summary": "SUSE Bug 1154747", "url": "https://bugzilla.suse.com/1154747" }, { "category": "self", "summary": "SUSE Bug 1154848", "url": "https://bugzilla.suse.com/1154848" }, { "category": "self", "summary": "SUSE Bug 1155178", "url": "https://bugzilla.suse.com/1155178" }, { "category": "self", "summary": "SUSE Bug 1155179", "url": "https://bugzilla.suse.com/1155179" }, { "category": "self", "summary": "SUSE Bug 1155184", "url": "https://bugzilla.suse.com/1155184" }, { "category": "self", "summary": "SUSE Bug 1155186", "url": "https://bugzilla.suse.com/1155186" }, { "category": "self", "summary": "SUSE CVE CVE-2019-16232 page", "url": "https://www.suse.com/security/cve/CVE-2019-16232/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-16233 page", "url": "https://www.suse.com/security/cve/CVE-2019-16233/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-16234 page", "url": "https://www.suse.com/security/cve/CVE-2019-16234/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-16995 page", "url": "https://www.suse.com/security/cve/CVE-2019-16995/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-17056 page", "url": "https://www.suse.com/security/cve/CVE-2019-17056/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-17133 page", "url": "https://www.suse.com/security/cve/CVE-2019-17133/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-17666 page", "url": "https://www.suse.com/security/cve/CVE-2019-17666/" } ], "title": "Security update for the Linux Kernel", "tracking": { "current_release_date": "2019-11-05T17:28:40Z", "generator": { "date": "2019-11-05T17:28:40Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "openSUSE-SU-2019:2444-1", "initial_release_date": "2019-11-05T17:28:40Z", "revision_history": [ { "date": "2019-11-05T17:28:40Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kernel-devel-4.12.14-lp151.28.25.1.noarch", "product": { "name": "kernel-devel-4.12.14-lp151.28.25.1.noarch", "product_id": "kernel-devel-4.12.14-lp151.28.25.1.noarch" } }, { "category": "product_version", "name": "kernel-docs-4.12.14-lp151.28.25.1.noarch", "product": { "name": "kernel-docs-4.12.14-lp151.28.25.1.noarch", "product_id": "kernel-docs-4.12.14-lp151.28.25.1.noarch" } }, { "category": "product_version", "name": "kernel-docs-html-4.12.14-lp151.28.25.1.noarch", "product": { "name": "kernel-docs-html-4.12.14-lp151.28.25.1.noarch", "product_id": "kernel-docs-html-4.12.14-lp151.28.25.1.noarch" } }, { "category": "product_version", "name": "kernel-macros-4.12.14-lp151.28.25.1.noarch", "product": { "name": "kernel-macros-4.12.14-lp151.28.25.1.noarch", "product_id": "kernel-macros-4.12.14-lp151.28.25.1.noarch" } }, { "category": "product_version", "name": "kernel-source-4.12.14-lp151.28.25.1.noarch", "product": { "name": "kernel-source-4.12.14-lp151.28.25.1.noarch", "product_id": "kernel-source-4.12.14-lp151.28.25.1.noarch" } }, { "category": "product_version", "name": "kernel-source-vanilla-4.12.14-lp151.28.25.1.noarch", "product": { "name": "kernel-source-vanilla-4.12.14-lp151.28.25.1.noarch", "product_id": "kernel-source-vanilla-4.12.14-lp151.28.25.1.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "kernel-debug-4.12.14-lp151.28.25.1.x86_64", "product": { "name": "kernel-debug-4.12.14-lp151.28.25.1.x86_64", "product_id": "kernel-debug-4.12.14-lp151.28.25.1.x86_64" } }, { "category": "product_version", "name": "kernel-debug-base-4.12.14-lp151.28.25.1.x86_64", "product": { "name": "kernel-debug-base-4.12.14-lp151.28.25.1.x86_64", "product_id": "kernel-debug-base-4.12.14-lp151.28.25.1.x86_64" } }, { "category": "product_version", "name": "kernel-debug-devel-4.12.14-lp151.28.25.1.x86_64", "product": { "name": "kernel-debug-devel-4.12.14-lp151.28.25.1.x86_64", "product_id": "kernel-debug-devel-4.12.14-lp151.28.25.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-4.12.14-lp151.28.25.1.x86_64", "product": { "name": "kernel-default-4.12.14-lp151.28.25.1.x86_64", "product_id": "kernel-default-4.12.14-lp151.28.25.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-base-4.12.14-lp151.28.25.1.x86_64", "product": { "name": "kernel-default-base-4.12.14-lp151.28.25.1.x86_64", "product_id": "kernel-default-base-4.12.14-lp151.28.25.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-devel-4.12.14-lp151.28.25.1.x86_64", "product": { "name": "kernel-default-devel-4.12.14-lp151.28.25.1.x86_64", "product_id": "kernel-default-devel-4.12.14-lp151.28.25.1.x86_64" } }, { "category": "product_version", "name": "kernel-kvmsmall-4.12.14-lp151.28.25.1.x86_64", "product": { "name": "kernel-kvmsmall-4.12.14-lp151.28.25.1.x86_64", "product_id": "kernel-kvmsmall-4.12.14-lp151.28.25.1.x86_64" } }, { "category": "product_version", "name": "kernel-kvmsmall-base-4.12.14-lp151.28.25.1.x86_64", "product": { "name": "kernel-kvmsmall-base-4.12.14-lp151.28.25.1.x86_64", "product_id": "kernel-kvmsmall-base-4.12.14-lp151.28.25.1.x86_64" } }, { "category": "product_version", "name": "kernel-kvmsmall-devel-4.12.14-lp151.28.25.1.x86_64", "product": { "name": "kernel-kvmsmall-devel-4.12.14-lp151.28.25.1.x86_64", "product_id": "kernel-kvmsmall-devel-4.12.14-lp151.28.25.1.x86_64" } }, { "category": "product_version", "name": "kernel-obs-build-4.12.14-lp151.28.25.1.x86_64", "product": { "name": "kernel-obs-build-4.12.14-lp151.28.25.1.x86_64", "product_id": "kernel-obs-build-4.12.14-lp151.28.25.1.x86_64" } }, { "category": "product_version", "name": "kernel-obs-qa-4.12.14-lp151.28.25.1.x86_64", "product": { "name": "kernel-obs-qa-4.12.14-lp151.28.25.1.x86_64", "product_id": "kernel-obs-qa-4.12.14-lp151.28.25.1.x86_64" } }, { "category": "product_version", "name": "kernel-syms-4.12.14-lp151.28.25.1.x86_64", "product": { "name": "kernel-syms-4.12.14-lp151.28.25.1.x86_64", "product_id": "kernel-syms-4.12.14-lp151.28.25.1.x86_64" } }, { "category": "product_version", "name": "kernel-vanilla-4.12.14-lp151.28.25.1.x86_64", "product": { "name": "kernel-vanilla-4.12.14-lp151.28.25.1.x86_64", "product_id": "kernel-vanilla-4.12.14-lp151.28.25.1.x86_64" } }, { "category": "product_version", "name": "kernel-vanilla-base-4.12.14-lp151.28.25.1.x86_64", "product": { "name": "kernel-vanilla-base-4.12.14-lp151.28.25.1.x86_64", "product_id": "kernel-vanilla-base-4.12.14-lp151.28.25.1.x86_64" } }, { "category": "product_version", "name": "kernel-vanilla-devel-4.12.14-lp151.28.25.1.x86_64", "product": { "name": "kernel-vanilla-devel-4.12.14-lp151.28.25.1.x86_64", "product_id": "kernel-vanilla-devel-4.12.14-lp151.28.25.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "openSUSE Leap 15.1", "product": { "name": "openSUSE Leap 15.1", "product_id": "openSUSE Leap 15.1", "product_identification_helper": { "cpe": "cpe:/o:opensuse:leap:15.1" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-4.12.14-lp151.28.25.1.x86_64 as component of openSUSE Leap 15.1", "product_id": "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.25.1.x86_64" }, "product_reference": "kernel-debug-4.12.14-lp151.28.25.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-base-4.12.14-lp151.28.25.1.x86_64 as component of openSUSE Leap 15.1", "product_id": "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.25.1.x86_64" }, "product_reference": "kernel-debug-base-4.12.14-lp151.28.25.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-4.12.14-lp151.28.25.1.x86_64 as component of openSUSE Leap 15.1", "product_id": "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.25.1.x86_64" }, "product_reference": "kernel-debug-devel-4.12.14-lp151.28.25.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-lp151.28.25.1.x86_64 as component of openSUSE Leap 15.1", "product_id": "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.25.1.x86_64" }, "product_reference": "kernel-default-4.12.14-lp151.28.25.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.12.14-lp151.28.25.1.x86_64 as component of openSUSE Leap 15.1", "product_id": "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.25.1.x86_64" }, "product_reference": "kernel-default-base-4.12.14-lp151.28.25.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-lp151.28.25.1.x86_64 as component of openSUSE Leap 15.1", "product_id": "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.25.1.x86_64" }, "product_reference": "kernel-default-devel-4.12.14-lp151.28.25.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-4.12.14-lp151.28.25.1.noarch as component of openSUSE Leap 15.1", "product_id": "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.25.1.noarch" }, "product_reference": "kernel-devel-4.12.14-lp151.28.25.1.noarch", "relates_to_product_reference": "openSUSE Leap 15.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-docs-4.12.14-lp151.28.25.1.noarch as component of openSUSE Leap 15.1", "product_id": "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.25.1.noarch" }, "product_reference": "kernel-docs-4.12.14-lp151.28.25.1.noarch", "relates_to_product_reference": "openSUSE Leap 15.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-docs-html-4.12.14-lp151.28.25.1.noarch as component of openSUSE Leap 15.1", "product_id": "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.25.1.noarch" }, "product_reference": "kernel-docs-html-4.12.14-lp151.28.25.1.noarch", "relates_to_product_reference": "openSUSE Leap 15.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kvmsmall-4.12.14-lp151.28.25.1.x86_64 as component of openSUSE Leap 15.1", "product_id": "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.25.1.x86_64" }, "product_reference": "kernel-kvmsmall-4.12.14-lp151.28.25.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kvmsmall-base-4.12.14-lp151.28.25.1.x86_64 as component of openSUSE Leap 15.1", "product_id": "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.25.1.x86_64" }, "product_reference": "kernel-kvmsmall-base-4.12.14-lp151.28.25.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kvmsmall-devel-4.12.14-lp151.28.25.1.x86_64 as component of openSUSE Leap 15.1", "product_id": "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.25.1.x86_64" }, "product_reference": "kernel-kvmsmall-devel-4.12.14-lp151.28.25.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-4.12.14-lp151.28.25.1.noarch as component of openSUSE Leap 15.1", "product_id": "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.25.1.noarch" }, "product_reference": "kernel-macros-4.12.14-lp151.28.25.1.noarch", "relates_to_product_reference": "openSUSE Leap 15.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-4.12.14-lp151.28.25.1.x86_64 as component of openSUSE Leap 15.1", "product_id": "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.25.1.x86_64" }, "product_reference": "kernel-obs-build-4.12.14-lp151.28.25.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-qa-4.12.14-lp151.28.25.1.x86_64 as component of openSUSE Leap 15.1", "product_id": "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.25.1.x86_64" }, "product_reference": "kernel-obs-qa-4.12.14-lp151.28.25.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-4.12.14-lp151.28.25.1.noarch as component of openSUSE Leap 15.1", "product_id": "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.25.1.noarch" }, "product_reference": "kernel-source-4.12.14-lp151.28.25.1.noarch", "relates_to_product_reference": "openSUSE Leap 15.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-vanilla-4.12.14-lp151.28.25.1.noarch as component of openSUSE Leap 15.1", "product_id": "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.25.1.noarch" }, "product_reference": "kernel-source-vanilla-4.12.14-lp151.28.25.1.noarch", "relates_to_product_reference": "openSUSE Leap 15.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-lp151.28.25.1.x86_64 as component of openSUSE Leap 15.1", "product_id": "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.25.1.x86_64" }, "product_reference": "kernel-syms-4.12.14-lp151.28.25.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-vanilla-4.12.14-lp151.28.25.1.x86_64 as component of openSUSE Leap 15.1", "product_id": "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.25.1.x86_64" }, "product_reference": "kernel-vanilla-4.12.14-lp151.28.25.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-vanilla-base-4.12.14-lp151.28.25.1.x86_64 as component of openSUSE Leap 15.1", "product_id": "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.25.1.x86_64" }, "product_reference": "kernel-vanilla-base-4.12.14-lp151.28.25.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-vanilla-devel-4.12.14-lp151.28.25.1.x86_64 as component of openSUSE Leap 15.1", "product_id": "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.25.1.x86_64" }, "product_reference": "kernel-vanilla-devel-4.12.14-lp151.28.25.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.1" } ] }, "vulnerabilities": [ { "cve": "CVE-2019-16232", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-16232" } ], "notes": [ { "category": "general", "text": "drivers/net/wireless/marvell/libertas/if_sdio.c in the Linux kernel 5.2.14 does not check the alloc_workqueue return value, leading to a NULL pointer dereference.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.25.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.25.1.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.25.1.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.25.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.25.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.25.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.25.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-16232", "url": "https://www.suse.com/security/cve/CVE-2019-16232" }, { "category": "external", "summary": "SUSE Bug 1150465 for CVE-2019-16232", "url": "https://bugzilla.suse.com/1150465" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.25.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.25.1.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.25.1.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.25.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.25.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.25.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.25.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.25.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.25.1.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.25.1.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.25.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.25.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.25.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.25.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-11-05T17:28:40Z", "details": "low" } ], "title": "CVE-2019-16232" }, { "cve": "CVE-2019-16233", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-16233" } ], "notes": [ { "category": "general", "text": "drivers/scsi/qla2xxx/qla_os.c in the Linux kernel 5.2.14 does not check the alloc_workqueue return value, leading to a NULL pointer dereference.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.25.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.25.1.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.25.1.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.25.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.25.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.25.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.25.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-16233", "url": "https://www.suse.com/security/cve/CVE-2019-16233" }, { "category": "external", "summary": "SUSE Bug 1150457 for CVE-2019-16233", "url": "https://bugzilla.suse.com/1150457" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.25.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.25.1.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.25.1.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.25.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.25.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.25.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.25.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.25.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.25.1.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.25.1.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.25.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.25.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.25.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.25.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-11-05T17:28:40Z", "details": "low" } ], "title": "CVE-2019-16233" }, { "cve": "CVE-2019-16234", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-16234" } ], "notes": [ { "category": "general", "text": "drivers/net/wireless/intel/iwlwifi/pcie/trans.c in the Linux kernel 5.2.14 does not check the alloc_workqueue return value, leading to a NULL pointer dereference.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.25.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.25.1.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.25.1.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.25.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.25.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.25.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.25.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-16234", "url": "https://www.suse.com/security/cve/CVE-2019-16234" }, { "category": "external", "summary": "SUSE Bug 1150452 for CVE-2019-16234", "url": "https://bugzilla.suse.com/1150452" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.25.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.25.1.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.25.1.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.25.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.25.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.25.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.25.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.25.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.25.1.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.25.1.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.25.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.25.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.25.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.25.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-11-05T17:28:40Z", "details": "low" } ], "title": "CVE-2019-16234" }, { "cve": "CVE-2019-16995", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-16995" } ], "notes": [ { "category": "general", "text": "In the Linux kernel before 5.0.3, a memory leak exits in hsr_dev_finalize() in net/hsr/hsr_device.c if hsr_add_port fails to add a port, which may cause denial of service, aka CID-6caabe7f197d.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.25.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.25.1.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.25.1.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.25.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.25.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.25.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.25.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-16995", "url": "https://www.suse.com/security/cve/CVE-2019-16995" }, { "category": "external", "summary": "SUSE Bug 1152685 for CVE-2019-16995", "url": "https://bugzilla.suse.com/1152685" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.25.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.25.1.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.25.1.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.25.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.25.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.25.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.25.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.25.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.25.1.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.25.1.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.25.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.25.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.25.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.25.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-11-05T17:28:40Z", "details": "moderate" } ], "title": "CVE-2019-16995" }, { "cve": "CVE-2019-17056", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-17056" } ], "notes": [ { "category": "general", "text": "llcp_sock_create in net/nfc/llcp_sock.c in the AF_NFC network module in the Linux kernel through 5.3.2 does not enforce CAP_NET_RAW, which means that unprivileged users can create a raw socket, aka CID-3a359798b176.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.25.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.25.1.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.25.1.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.25.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.25.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.25.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.25.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-17056", "url": "https://www.suse.com/security/cve/CVE-2019-17056" }, { "category": "external", "summary": "SUSE Bug 1152788 for CVE-2019-17056", "url": "https://bugzilla.suse.com/1152788" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.25.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.25.1.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.25.1.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.25.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.25.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.25.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.25.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "products": [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.25.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.25.1.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.25.1.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.25.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.25.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.25.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.25.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-11-05T17:28:40Z", "details": "moderate" } ], "title": "CVE-2019-17056" }, { "cve": "CVE-2019-17133", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-17133" } ], "notes": [ { "category": "general", "text": "In the Linux kernel through 5.3.2, cfg80211_mgd_wext_giwessid in net/wireless/wext-sme.c does not reject a long SSID IE, leading to a Buffer Overflow.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.25.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.25.1.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.25.1.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.25.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.25.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.25.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.25.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-17133", "url": "https://www.suse.com/security/cve/CVE-2019-17133" }, { "category": "external", "summary": "SUSE Bug 1153158 for CVE-2019-17133", "url": "https://bugzilla.suse.com/1153158" }, { "category": "external", "summary": "SUSE Bug 1153161 for CVE-2019-17133", "url": "https://bugzilla.suse.com/1153161" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.25.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.25.1.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.25.1.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.25.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.25.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.25.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.25.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.25.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.25.1.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.25.1.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.25.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.25.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.25.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.25.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-11-05T17:28:40Z", "details": "important" } ], "title": "CVE-2019-17133" }, { "cve": "CVE-2019-17666", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-17666" } ], "notes": [ { "category": "general", "text": "rtl_p2p_noa_ie in drivers/net/wireless/realtek/rtlwifi/ps.c in the Linux kernel through 5.3.6 lacks a certain upper-bound check, leading to a buffer overflow.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.25.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.25.1.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.25.1.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.25.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.25.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.25.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.25.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-17666", "url": "https://www.suse.com/security/cve/CVE-2019-17666" }, { "category": "external", "summary": "SUSE Bug 1154372 for CVE-2019-17666", "url": "https://bugzilla.suse.com/1154372" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.25.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.25.1.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.25.1.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.25.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.25.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.25.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.25.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L", "version": "3.0" }, "products": [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.25.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.25.1.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.25.1.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.25.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.25.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.25.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.25.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-11-05T17:28:40Z", "details": "moderate" } ], "title": "CVE-2019-17666" } ] }
opensuse-su-2024:10728-1
Vulnerability from csaf_opensuse
Published
2024-06-15 00:00
Modified
2024-06-15 00:00
Summary
kernel-devel-5.14.6-1.4 on GA media
Notes
Title of the patch
kernel-devel-5.14.6-1.4 on GA media
Description of the patch
These are all security issues fixed in the kernel-devel-5.14.6-1.4 package on the GA media of openSUSE Tumbleweed.
Patchnames
openSUSE-Tumbleweed-2024-10728
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "kernel-devel-5.14.6-1.4 on GA media", "title": "Title of the patch" }, { "category": "description", "text": "These are all security issues fixed in the kernel-devel-5.14.6-1.4 package on the GA media of openSUSE Tumbleweed.", "title": "Description of the patch" }, { "category": "details", "text": "openSUSE-Tumbleweed-2024-10728", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2024_10728-1.json" }, { "category": "self", "summary": "SUSE CVE CVE-2017-1000251 page", "url": "https://www.suse.com/security/cve/CVE-2017-1000251/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-12153 page", "url": "https://www.suse.com/security/cve/CVE-2017-12153/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-13080 page", "url": "https://www.suse.com/security/cve/CVE-2017-13080/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-14051 page", "url": "https://www.suse.com/security/cve/CVE-2017-14051/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-15129 page", "url": "https://www.suse.com/security/cve/CVE-2017-15129/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-15265 page", "url": "https://www.suse.com/security/cve/CVE-2017-15265/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-16536 page", "url": "https://www.suse.com/security/cve/CVE-2017-16536/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-16537 page", "url": "https://www.suse.com/security/cve/CVE-2017-16537/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-16645 page", "url": "https://www.suse.com/security/cve/CVE-2017-16645/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-16646 page", "url": "https://www.suse.com/security/cve/CVE-2017-16646/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-16647 page", "url": "https://www.suse.com/security/cve/CVE-2017-16647/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-16648 page", "url": "https://www.suse.com/security/cve/CVE-2017-16648/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-16995 page", "url": "https://www.suse.com/security/cve/CVE-2017-16995/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-16996 page", "url": "https://www.suse.com/security/cve/CVE-2017-16996/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-17448 page", "url": "https://www.suse.com/security/cve/CVE-2017-17448/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-17449 page", "url": "https://www.suse.com/security/cve/CVE-2017-17449/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-17450 page", "url": "https://www.suse.com/security/cve/CVE-2017-17450/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-17852 page", "url": "https://www.suse.com/security/cve/CVE-2017-17852/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-17853 page", "url": "https://www.suse.com/security/cve/CVE-2017-17853/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-17854 page", "url": "https://www.suse.com/security/cve/CVE-2017-17854/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-17855 page", "url": "https://www.suse.com/security/cve/CVE-2017-17855/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-17856 page", "url": "https://www.suse.com/security/cve/CVE-2017-17856/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-17857 page", "url": "https://www.suse.com/security/cve/CVE-2017-17857/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-17862 page", "url": "https://www.suse.com/security/cve/CVE-2017-17862/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-5123 page", "url": "https://www.suse.com/security/cve/CVE-2017-5123/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-5715 page", "url": "https://www.suse.com/security/cve/CVE-2017-5715/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-5753 page", "url": "https://www.suse.com/security/cve/CVE-2017-5753/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-5754 page", "url": "https://www.suse.com/security/cve/CVE-2017-5754/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-7541 page", "url": "https://www.suse.com/security/cve/CVE-2017-7541/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-7542 page", "url": "https://www.suse.com/security/cve/CVE-2017-7542/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-8824 page", "url": "https://www.suse.com/security/cve/CVE-2017-8824/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-8831 page", "url": "https://www.suse.com/security/cve/CVE-2017-8831/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-1000004 page", "url": "https://www.suse.com/security/cve/CVE-2018-1000004/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-10322 page", "url": "https://www.suse.com/security/cve/CVE-2018-10322/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-10323 page", "url": "https://www.suse.com/security/cve/CVE-2018-10323/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-1068 page", "url": "https://www.suse.com/security/cve/CVE-2018-1068/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-1118 page", "url": "https://www.suse.com/security/cve/CVE-2018-1118/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-12232 page", "url": "https://www.suse.com/security/cve/CVE-2018-12232/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-12714 page", "url": "https://www.suse.com/security/cve/CVE-2018-12714/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-13053 page", "url": "https://www.suse.com/security/cve/CVE-2018-13053/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-18710 page", "url": "https://www.suse.com/security/cve/CVE-2018-18710/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-19824 page", "url": "https://www.suse.com/security/cve/CVE-2018-19824/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-5332 page", "url": "https://www.suse.com/security/cve/CVE-2018-5332/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-5333 page", "url": "https://www.suse.com/security/cve/CVE-2018-5333/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-8043 page", "url": "https://www.suse.com/security/cve/CVE-2018-8043/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-8087 page", "url": "https://www.suse.com/security/cve/CVE-2018-8087/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-8822 page", "url": "https://www.suse.com/security/cve/CVE-2018-8822/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-10207 page", "url": "https://www.suse.com/security/cve/CVE-2019-10207/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-11477 page", "url": "https://www.suse.com/security/cve/CVE-2019-11477/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-11478 page", "url": "https://www.suse.com/security/cve/CVE-2019-11478/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-11479 page", "url": "https://www.suse.com/security/cve/CVE-2019-11479/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-14615 page", "url": "https://www.suse.com/security/cve/CVE-2019-14615/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-14814 page", "url": "https://www.suse.com/security/cve/CVE-2019-14814/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-14896 page", "url": "https://www.suse.com/security/cve/CVE-2019-14896/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-15030 page", "url": "https://www.suse.com/security/cve/CVE-2019-15030/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-15031 page", "url": "https://www.suse.com/security/cve/CVE-2019-15031/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-15098 page", "url": "https://www.suse.com/security/cve/CVE-2019-15098/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-15099 page", "url": "https://www.suse.com/security/cve/CVE-2019-15099/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-15290 page", "url": "https://www.suse.com/security/cve/CVE-2019-15290/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-15504 page", "url": "https://www.suse.com/security/cve/CVE-2019-15504/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-15902 page", "url": "https://www.suse.com/security/cve/CVE-2019-15902/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-16231 page", "url": "https://www.suse.com/security/cve/CVE-2019-16231/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-16232 page", "url": "https://www.suse.com/security/cve/CVE-2019-16232/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-16234 page", "url": "https://www.suse.com/security/cve/CVE-2019-16234/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-17133 page", "url": "https://www.suse.com/security/cve/CVE-2019-17133/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-17666 page", "url": "https://www.suse.com/security/cve/CVE-2019-17666/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-18808 page", "url": "https://www.suse.com/security/cve/CVE-2019-18808/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-18812 page", "url": "https://www.suse.com/security/cve/CVE-2019-18812/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-18813 page", "url": "https://www.suse.com/security/cve/CVE-2019-18813/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-19252 page", "url": "https://www.suse.com/security/cve/CVE-2019-19252/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-19332 page", "url": "https://www.suse.com/security/cve/CVE-2019-19332/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-19338 page", "url": "https://www.suse.com/security/cve/CVE-2019-19338/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-3016 page", "url": "https://www.suse.com/security/cve/CVE-2019-3016/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-3846 page", "url": "https://www.suse.com/security/cve/CVE-2019-3846/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-3882 page", "url": "https://www.suse.com/security/cve/CVE-2019-3882/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-3887 page", "url": "https://www.suse.com/security/cve/CVE-2019-3887/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-6974 page", "url": "https://www.suse.com/security/cve/CVE-2019-6974/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-7221 page", "url": "https://www.suse.com/security/cve/CVE-2019-7221/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-7222 page", "url": "https://www.suse.com/security/cve/CVE-2019-7222/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-8564 page", "url": "https://www.suse.com/security/cve/CVE-2019-8564/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-8912 page", "url": "https://www.suse.com/security/cve/CVE-2019-8912/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-9500 page", "url": "https://www.suse.com/security/cve/CVE-2019-9500/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-10135 page", "url": "https://www.suse.com/security/cve/CVE-2020-10135/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-10766 page", "url": "https://www.suse.com/security/cve/CVE-2020-10766/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-10767 page", "url": "https://www.suse.com/security/cve/CVE-2020-10767/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-10768 page", "url": "https://www.suse.com/security/cve/CVE-2020-10768/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-12351 page", "url": "https://www.suse.com/security/cve/CVE-2020-12351/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-12352 page", "url": "https://www.suse.com/security/cve/CVE-2020-12352/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14331 page", "url": "https://www.suse.com/security/cve/CVE-2020-14331/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14386 page", "url": "https://www.suse.com/security/cve/CVE-2020-14386/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-24586 page", "url": "https://www.suse.com/security/cve/CVE-2020-24586/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-24587 page", "url": "https://www.suse.com/security/cve/CVE-2020-24587/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-24588 page", "url": "https://www.suse.com/security/cve/CVE-2020-24588/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-25639 page", "url": "https://www.suse.com/security/cve/CVE-2020-25639/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-25656 page", "url": "https://www.suse.com/security/cve/CVE-2020-25656/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-25668 page", "url": "https://www.suse.com/security/cve/CVE-2020-25668/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-26141 page", "url": "https://www.suse.com/security/cve/CVE-2020-26141/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-2732 page", "url": "https://www.suse.com/security/cve/CVE-2020-2732/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-29660 page", "url": "https://www.suse.com/security/cve/CVE-2020-29660/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-29661 page", "url": "https://www.suse.com/security/cve/CVE-2020-29661/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-8648 page", "url": "https://www.suse.com/security/cve/CVE-2020-8648/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-8694 page", "url": "https://www.suse.com/security/cve/CVE-2020-8694/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-23133 page", "url": "https://www.suse.com/security/cve/CVE-2021-23133/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-26708 page", "url": "https://www.suse.com/security/cve/CVE-2021-26708/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-28971 page", "url": "https://www.suse.com/security/cve/CVE-2021-28971/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-32606 page", "url": "https://www.suse.com/security/cve/CVE-2021-32606/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-33909 page", "url": "https://www.suse.com/security/cve/CVE-2021-33909/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-3483 page", "url": "https://www.suse.com/security/cve/CVE-2021-3483/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-3489 page", "url": "https://www.suse.com/security/cve/CVE-2021-3489/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-3490 page", "url": "https://www.suse.com/security/cve/CVE-2021-3490/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-3491 page", "url": "https://www.suse.com/security/cve/CVE-2021-3491/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-3640 page", "url": "https://www.suse.com/security/cve/CVE-2021-3640/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-3653 page", "url": "https://www.suse.com/security/cve/CVE-2021-3653/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-3656 page", "url": "https://www.suse.com/security/cve/CVE-2021-3656/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-3744 page", "url": "https://www.suse.com/security/cve/CVE-2021-3744/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-3753 page", "url": "https://www.suse.com/security/cve/CVE-2021-3753/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-37576 page", "url": "https://www.suse.com/security/cve/CVE-2021-37576/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-3759 page", "url": "https://www.suse.com/security/cve/CVE-2021-3759/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-38166 page", "url": "https://www.suse.com/security/cve/CVE-2021-38166/" } ], "title": "kernel-devel-5.14.6-1.4 on GA media", "tracking": { "current_release_date": "2024-06-15T00:00:00Z", "generator": { "date": "2024-06-15T00:00:00Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "openSUSE-SU-2024:10728-1", "initial_release_date": "2024-06-15T00:00:00Z", "revision_history": [ { "date": "2024-06-15T00:00:00Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kernel-devel-5.14.6-1.4.aarch64", "product": { "name": "kernel-devel-5.14.6-1.4.aarch64", "product_id": "kernel-devel-5.14.6-1.4.aarch64" } }, { "category": "product_version", "name": "kernel-macros-5.14.6-1.4.aarch64", "product": { "name": "kernel-macros-5.14.6-1.4.aarch64", "product_id": "kernel-macros-5.14.6-1.4.aarch64" } }, { "category": "product_version", "name": "kernel-source-5.14.6-1.4.aarch64", "product": { "name": "kernel-source-5.14.6-1.4.aarch64", "product_id": "kernel-source-5.14.6-1.4.aarch64" } }, { "category": "product_version", "name": "kernel-source-vanilla-5.14.6-1.4.aarch64", "product": { "name": "kernel-source-vanilla-5.14.6-1.4.aarch64", "product_id": "kernel-source-vanilla-5.14.6-1.4.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "kernel-devel-5.14.6-1.4.ppc64le", "product": { "name": "kernel-devel-5.14.6-1.4.ppc64le", "product_id": "kernel-devel-5.14.6-1.4.ppc64le" } }, { "category": "product_version", "name": "kernel-macros-5.14.6-1.4.ppc64le", "product": { "name": "kernel-macros-5.14.6-1.4.ppc64le", "product_id": "kernel-macros-5.14.6-1.4.ppc64le" } }, { "category": "product_version", "name": "kernel-source-5.14.6-1.4.ppc64le", "product": { "name": "kernel-source-5.14.6-1.4.ppc64le", "product_id": "kernel-source-5.14.6-1.4.ppc64le" } }, { "category": "product_version", "name": "kernel-source-vanilla-5.14.6-1.4.ppc64le", "product": { "name": "kernel-source-vanilla-5.14.6-1.4.ppc64le", "product_id": "kernel-source-vanilla-5.14.6-1.4.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "kernel-devel-5.14.6-1.4.s390x", "product": { "name": "kernel-devel-5.14.6-1.4.s390x", "product_id": "kernel-devel-5.14.6-1.4.s390x" } }, { "category": "product_version", "name": "kernel-macros-5.14.6-1.4.s390x", "product": { "name": "kernel-macros-5.14.6-1.4.s390x", "product_id": "kernel-macros-5.14.6-1.4.s390x" } }, { "category": "product_version", "name": "kernel-source-5.14.6-1.4.s390x", "product": { "name": "kernel-source-5.14.6-1.4.s390x", "product_id": "kernel-source-5.14.6-1.4.s390x" } }, { "category": "product_version", "name": "kernel-source-vanilla-5.14.6-1.4.s390x", "product": { "name": "kernel-source-vanilla-5.14.6-1.4.s390x", "product_id": "kernel-source-vanilla-5.14.6-1.4.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "kernel-devel-5.14.6-1.4.x86_64", "product": { "name": "kernel-devel-5.14.6-1.4.x86_64", "product_id": "kernel-devel-5.14.6-1.4.x86_64" } }, { "category": "product_version", "name": "kernel-macros-5.14.6-1.4.x86_64", "product": { "name": "kernel-macros-5.14.6-1.4.x86_64", "product_id": "kernel-macros-5.14.6-1.4.x86_64" } }, { "category": "product_version", "name": "kernel-source-5.14.6-1.4.x86_64", "product": { "name": "kernel-source-5.14.6-1.4.x86_64", "product_id": "kernel-source-5.14.6-1.4.x86_64" } }, { "category": "product_version", "name": "kernel-source-vanilla-5.14.6-1.4.x86_64", "product": { "name": "kernel-source-vanilla-5.14.6-1.4.x86_64", "product_id": "kernel-source-vanilla-5.14.6-1.4.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "openSUSE Tumbleweed", "product": { "name": "openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed", "product_identification_helper": { "cpe": "cpe:/o:opensuse:tumbleweed" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-5.14.6-1.4.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64" }, "product_reference": "kernel-devel-5.14.6-1.4.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-5.14.6-1.4.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le" }, "product_reference": "kernel-devel-5.14.6-1.4.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-5.14.6-1.4.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x" }, "product_reference": "kernel-devel-5.14.6-1.4.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-5.14.6-1.4.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64" }, "product_reference": "kernel-devel-5.14.6-1.4.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-5.14.6-1.4.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64" }, "product_reference": "kernel-macros-5.14.6-1.4.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-5.14.6-1.4.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le" }, "product_reference": "kernel-macros-5.14.6-1.4.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-5.14.6-1.4.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x" }, "product_reference": "kernel-macros-5.14.6-1.4.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-5.14.6-1.4.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64" }, "product_reference": "kernel-macros-5.14.6-1.4.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-5.14.6-1.4.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64" }, "product_reference": "kernel-source-5.14.6-1.4.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-5.14.6-1.4.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le" }, "product_reference": "kernel-source-5.14.6-1.4.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-5.14.6-1.4.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x" }, "product_reference": "kernel-source-5.14.6-1.4.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-5.14.6-1.4.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64" }, "product_reference": "kernel-source-5.14.6-1.4.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-vanilla-5.14.6-1.4.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64" }, "product_reference": "kernel-source-vanilla-5.14.6-1.4.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-vanilla-5.14.6-1.4.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le" }, "product_reference": "kernel-source-vanilla-5.14.6-1.4.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-vanilla-5.14.6-1.4.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x" }, "product_reference": "kernel-source-vanilla-5.14.6-1.4.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-vanilla-5.14.6-1.4.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" }, "product_reference": "kernel-source-vanilla-5.14.6-1.4.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" } ] }, "vulnerabilities": [ { "cve": "CVE-2017-1000251", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-1000251" } ], "notes": [ { "category": "general", "text": "The native Bluetooth stack in the Linux Kernel (BlueZ), starting at the Linux kernel version 2.6.32 and up to and including 4.13.1, are vulnerable to a stack overflow vulnerability in the processing of L2CAP configuration responses resulting in Remote code execution in kernel space.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-1000251", "url": "https://www.suse.com/security/cve/CVE-2017-1000251" }, { "category": "external", "summary": "SUSE Bug 1057389 for CVE-2017-1000251", "url": "https://bugzilla.suse.com/1057389" }, { "category": "external", "summary": "SUSE Bug 1057950 for CVE-2017-1000251", "url": "https://bugzilla.suse.com/1057950" }, { "category": "external", "summary": "SUSE Bug 1070535 for CVE-2017-1000251", "url": "https://bugzilla.suse.com/1070535" }, { "category": "external", "summary": "SUSE Bug 1072117 for CVE-2017-1000251", "url": "https://bugzilla.suse.com/1072117" }, { "category": "external", "summary": "SUSE Bug 1072162 for CVE-2017-1000251", "url": "https://bugzilla.suse.com/1072162" }, { "category": "external", "summary": "SUSE Bug 1120758 for CVE-2017-1000251", "url": "https://bugzilla.suse.com/1120758" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2017-1000251" }, { "cve": "CVE-2017-12153", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-12153" } ], "notes": [ { "category": "general", "text": "A security flaw was discovered in the nl80211_set_rekey_data() function in net/wireless/nl80211.c in the Linux kernel through 4.13.3. This function does not check whether the required attributes are present in a Netlink request. This request can be issued by a user with the CAP_NET_ADMIN capability and may result in a NULL pointer dereference and system crash.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-12153", "url": "https://www.suse.com/security/cve/CVE-2017-12153" }, { "category": "external", "summary": "SUSE Bug 1058410 for CVE-2017-12153", "url": "https://bugzilla.suse.com/1058410" }, { "category": "external", "summary": "SUSE Bug 1058624 for CVE-2017-12153", "url": "https://bugzilla.suse.com/1058624" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2017-12153" }, { "cve": "CVE-2017-13080", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-13080" } ], "notes": [ { "category": "general", "text": "Wi-Fi Protected Access (WPA and WPA2) allows reinstallation of the Group Temporal Key (GTK) during the group key handshake, allowing an attacker within radio range to replay frames from access points to clients.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-13080", "url": "https://www.suse.com/security/cve/CVE-2017-13080" }, { "category": "external", "summary": "SUSE Bug 1056061 for CVE-2017-13080", "url": "https://bugzilla.suse.com/1056061" }, { "category": "external", "summary": "SUSE Bug 1063479 for CVE-2017-13080", "url": "https://bugzilla.suse.com/1063479" }, { "category": "external", "summary": "SUSE Bug 1063667 for CVE-2017-13080", "url": "https://bugzilla.suse.com/1063667" }, { "category": "external", "summary": "SUSE Bug 1063671 for CVE-2017-13080", "url": "https://bugzilla.suse.com/1063671" }, { "category": "external", "summary": "SUSE Bug 1066295 for CVE-2017-13080", "url": "https://bugzilla.suse.com/1066295" }, { "category": "external", "summary": "SUSE Bug 1105108 for CVE-2017-13080", "url": "https://bugzilla.suse.com/1105108" }, { "category": "external", "summary": "SUSE Bug 1178872 for CVE-2017-13080", "url": "https://bugzilla.suse.com/1178872" }, { "category": "external", "summary": "SUSE Bug 1179588 for CVE-2017-13080", "url": "https://bugzilla.suse.com/1179588" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2017-13080" }, { "cve": "CVE-2017-14051", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-14051" } ], "notes": [ { "category": "general", "text": "An integer overflow in the qla2x00_sysfs_write_optrom_ctl function in drivers/scsi/qla2xxx/qla_attr.c in the Linux kernel through 4.12.10 allows local users to cause a denial of service (memory corruption and system crash) by leveraging root access.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-14051", "url": "https://www.suse.com/security/cve/CVE-2017-14051" }, { "category": "external", "summary": "SUSE Bug 1056588 for CVE-2017-14051", "url": "https://bugzilla.suse.com/1056588" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2017-14051" }, { "cve": "CVE-2017-15129", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-15129" } ], "notes": [ { "category": "general", "text": "A use-after-free vulnerability was found in network namespaces code affecting the Linux kernel before 4.14.11. The function get_net_ns_by_id() in net/core/net_namespace.c does not check for the net::count value after it has found a peer network in netns_ids idr, which could lead to double free and memory corruption. This vulnerability could allow an unprivileged local user to induce kernel memory corruption on the system, leading to a crash. Due to the nature of the flaw, privilege escalation cannot be fully ruled out, although it is thought to be unlikely.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-15129", "url": "https://www.suse.com/security/cve/CVE-2017-15129" }, { "category": "external", "summary": "SUSE Bug 1074839 for CVE-2017-15129", "url": "https://bugzilla.suse.com/1074839" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2017-15129" }, { "cve": "CVE-2017-15265", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-15265" } ], "notes": [ { "category": "general", "text": "Race condition in the ALSA subsystem in the Linux kernel before 4.13.8 allows local users to cause a denial of service (use-after-free) or possibly have unspecified other impact via crafted /dev/snd/seq ioctl calls, related to sound/core/seq/seq_clientmgr.c and sound/core/seq/seq_ports.c.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-15265", "url": "https://www.suse.com/security/cve/CVE-2017-15265" }, { "category": "external", "summary": "SUSE Bug 1062520 for CVE-2017-15265", "url": "https://bugzilla.suse.com/1062520" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2017-15265", "url": "https://bugzilla.suse.com/1115893" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2017-15265" }, { "cve": "CVE-2017-16536", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-16536" } ], "notes": [ { "category": "general", "text": "The cx231xx_usb_probe function in drivers/media/usb/cx231xx/cx231xx-cards.c in the Linux kernel through 4.13.11 allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact via a crafted USB device.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-16536", "url": "https://www.suse.com/security/cve/CVE-2017-16536" }, { "category": "external", "summary": "SUSE Bug 1066606 for CVE-2017-16536", "url": "https://bugzilla.suse.com/1066606" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2017-16536", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1146519 for CVE-2017-16536", "url": "https://bugzilla.suse.com/1146519" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2017-16536" }, { "cve": "CVE-2017-16537", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-16537" } ], "notes": [ { "category": "general", "text": "The imon_probe function in drivers/media/rc/imon.c in the Linux kernel through 4.13.11 allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact via a crafted USB device.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-16537", "url": "https://www.suse.com/security/cve/CVE-2017-16537" }, { "category": "external", "summary": "SUSE Bug 1066573 for CVE-2017-16537", "url": "https://bugzilla.suse.com/1066573" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2017-16537", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1146519 for CVE-2017-16537", "url": "https://bugzilla.suse.com/1146519" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2017-16537" }, { "cve": "CVE-2017-16645", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-16645" } ], "notes": [ { "category": "general", "text": "The ims_pcu_get_cdc_union_desc function in drivers/input/misc/ims-pcu.c in the Linux kernel through 4.13.11 allows local users to cause a denial of service (ims_pcu_parse_cdc_data out-of-bounds read and system crash) or possibly have unspecified other impact via a crafted USB device.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-16645", "url": "https://www.suse.com/security/cve/CVE-2017-16645" }, { "category": "external", "summary": "SUSE Bug 1067132 for CVE-2017-16645", "url": "https://bugzilla.suse.com/1067132" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2017-16645", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1146519 for CVE-2017-16645", "url": "https://bugzilla.suse.com/1146519" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2017-16645" }, { "cve": "CVE-2017-16646", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-16646" } ], "notes": [ { "category": "general", "text": "drivers/media/usb/dvb-usb/dib0700_devices.c in the Linux kernel through 4.13.11 allows local users to cause a denial of service (BUG and system crash) or possibly have unspecified other impact via a crafted USB device.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-16646", "url": "https://www.suse.com/security/cve/CVE-2017-16646" }, { "category": "external", "summary": "SUSE Bug 1067105 for CVE-2017-16646", "url": "https://bugzilla.suse.com/1067105" }, { "category": "external", "summary": "SUSE Bug 1146519 for CVE-2017-16646", "url": "https://bugzilla.suse.com/1146519" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2017-16646" }, { "cve": "CVE-2017-16647", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-16647" } ], "notes": [ { "category": "general", "text": "drivers/net/usb/asix_devices.c in the Linux kernel through 4.13.11 allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact via a crafted USB device.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-16647", "url": "https://www.suse.com/security/cve/CVE-2017-16647" }, { "category": "external", "summary": "SUSE Bug 1067102 for CVE-2017-16647", "url": "https://bugzilla.suse.com/1067102" }, { "category": "external", "summary": "SUSE Bug 1146519 for CVE-2017-16647", "url": "https://bugzilla.suse.com/1146519" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2017-16647" }, { "cve": "CVE-2017-16648", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-16648" } ], "notes": [ { "category": "general", "text": "The dvb_frontend_free function in drivers/media/dvb-core/dvb_frontend.c in the Linux kernel through 4.13.11 allows local users to cause a denial of service (use-after-free and system crash) or possibly have unspecified other impact via a crafted USB device. NOTE: the function was later renamed __dvb_frontend_free.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-16648", "url": "https://www.suse.com/security/cve/CVE-2017-16648" }, { "category": "external", "summary": "SUSE Bug 1067087 for CVE-2017-16648", "url": "https://bugzilla.suse.com/1067087" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2017-16648", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1146519 for CVE-2017-16648", "url": "https://bugzilla.suse.com/1146519" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2017-16648" }, { "cve": "CVE-2017-16995", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-16995" } ], "notes": [ { "category": "general", "text": "The check_alu_op function in kernel/bpf/verifier.c in the Linux kernel through 4.4 allows local users to cause a denial of service (memory corruption) or possibly have unspecified other impact by leveraging incorrect sign extension.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-16995", "url": "https://www.suse.com/security/cve/CVE-2017-16995" }, { "category": "external", "summary": "SUSE Bug 1073928 for CVE-2017-16995", "url": "https://bugzilla.suse.com/1073928" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2017-16995" }, { "cve": "CVE-2017-16996", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-16996" } ], "notes": [ { "category": "general", "text": "kernel/bpf/verifier.c in the Linux kernel through 4.14.8 allows local users to cause a denial of service (memory corruption) or possibly have unspecified other impact by leveraging register truncation mishandling.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-16996", "url": "https://www.suse.com/security/cve/CVE-2017-16996" }, { "category": "external", "summary": "SUSE Bug 1073928 for CVE-2017-16996", "url": "https://bugzilla.suse.com/1073928" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2017-16996" }, { "cve": "CVE-2017-17448", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-17448" } ], "notes": [ { "category": "general", "text": "net/netfilter/nfnetlink_cthelper.c in the Linux kernel through 4.14.4 does not require the CAP_NET_ADMIN capability for new, get, and del operations, which allows local users to bypass intended access restrictions because the nfnl_cthelper_list data structure is shared across all net namespaces.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-17448", "url": "https://www.suse.com/security/cve/CVE-2017-17448" }, { "category": "external", "summary": "SUSE Bug 1071693 for CVE-2017-17448", "url": "https://bugzilla.suse.com/1071693" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:L", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2017-17448" }, { "cve": "CVE-2017-17449", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-17449" } ], "notes": [ { "category": "general", "text": "The __netlink_deliver_tap_skb function in net/netlink/af_netlink.c in the Linux kernel through 4.14.4, when CONFIG_NLMON is enabled, does not restrict observations of Netlink messages to a single net namespace, which allows local users to obtain sensitive information by leveraging the CAP_NET_ADMIN capability to sniff an nlmon interface for all Netlink activity on the system.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-17449", "url": "https://www.suse.com/security/cve/CVE-2017-17449" }, { "category": "external", "summary": "SUSE Bug 1071694 for CVE-2017-17449", "url": "https://bugzilla.suse.com/1071694" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2017-17449" }, { "cve": "CVE-2017-17450", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-17450" } ], "notes": [ { "category": "general", "text": "net/netfilter/xt_osf.c in the Linux kernel through 4.14.4 does not require the CAP_NET_ADMIN capability for add_callback and remove_callback operations, which allows local users to bypass intended access restrictions because the xt_osf_fingers data structure is shared across all net namespaces.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-17450", "url": "https://www.suse.com/security/cve/CVE-2017-17450" }, { "category": "external", "summary": "SUSE Bug 1071695 for CVE-2017-17450", "url": "https://bugzilla.suse.com/1071695" }, { "category": "external", "summary": "SUSE Bug 1074033 for CVE-2017-17450", "url": "https://bugzilla.suse.com/1074033" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2017-17450", "url": "https://bugzilla.suse.com/1115893" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2017-17450" }, { "cve": "CVE-2017-17852", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-17852" } ], "notes": [ { "category": "general", "text": "kernel/bpf/verifier.c in the Linux kernel through 4.14.8 allows local users to cause a denial of service (memory corruption) or possibly have unspecified other impact by leveraging mishandling of 32-bit ALU ops.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-17852", "url": "https://www.suse.com/security/cve/CVE-2017-17852" }, { "category": "external", "summary": "SUSE Bug 1073928 for CVE-2017-17852", "url": "https://bugzilla.suse.com/1073928" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2017-17852" }, { "cve": "CVE-2017-17853", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-17853" } ], "notes": [ { "category": "general", "text": "kernel/bpf/verifier.c in the Linux kernel through 4.14.8 allows local users to cause a denial of service (memory corruption) or possibly have unspecified other impact by leveraging incorrect BPF_RSH signed bounds calculations.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-17853", "url": "https://www.suse.com/security/cve/CVE-2017-17853" }, { "category": "external", "summary": "SUSE Bug 1073928 for CVE-2017-17853", "url": "https://bugzilla.suse.com/1073928" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2017-17853" }, { "cve": "CVE-2017-17854", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-17854" } ], "notes": [ { "category": "general", "text": "kernel/bpf/verifier.c in the Linux kernel through 4.14.8 allows local users to cause a denial of service (integer overflow and memory corruption) or possibly have unspecified other impact by leveraging unrestricted integer values for pointer arithmetic.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-17854", "url": "https://www.suse.com/security/cve/CVE-2017-17854" }, { "category": "external", "summary": "SUSE Bug 1073928 for CVE-2017-17854", "url": "https://bugzilla.suse.com/1073928" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2017-17854" }, { "cve": "CVE-2017-17855", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-17855" } ], "notes": [ { "category": "general", "text": "kernel/bpf/verifier.c in the Linux kernel through 4.14.8 allows local users to cause a denial of service (memory corruption) or possibly have unspecified other impact by leveraging improper use of pointers in place of scalars.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-17855", "url": "https://www.suse.com/security/cve/CVE-2017-17855" }, { "category": "external", "summary": "SUSE Bug 1073928 for CVE-2017-17855", "url": "https://bugzilla.suse.com/1073928" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2017-17855" }, { "cve": "CVE-2017-17856", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-17856" } ], "notes": [ { "category": "general", "text": "kernel/bpf/verifier.c in the Linux kernel through 4.14.8 allows local users to cause a denial of service (memory corruption) or possibly have unspecified other impact by leveraging the lack of stack-pointer alignment enforcement.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-17856", "url": "https://www.suse.com/security/cve/CVE-2017-17856" }, { "category": "external", "summary": "SUSE Bug 1073928 for CVE-2017-17856", "url": "https://bugzilla.suse.com/1073928" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2017-17856" }, { "cve": "CVE-2017-17857", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-17857" } ], "notes": [ { "category": "general", "text": "The check_stack_boundary function in kernel/bpf/verifier.c in the Linux kernel through 4.14.8 allows local users to cause a denial of service (memory corruption) or possibly have unspecified other impact by leveraging mishandling of invalid variable stack read operations.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-17857", "url": "https://www.suse.com/security/cve/CVE-2017-17857" }, { "category": "external", "summary": "SUSE Bug 1073928 for CVE-2017-17857", "url": "https://bugzilla.suse.com/1073928" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2017-17857" }, { "cve": "CVE-2017-17862", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-17862" } ], "notes": [ { "category": "general", "text": "kernel/bpf/verifier.c in the Linux kernel through 4.14.8 ignores unreachable code, even though it would still be processed by JIT compilers. This behavior, also considered an improper branch-pruning logic issue, could possibly be used by local users for denial of service.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-17862", "url": "https://www.suse.com/security/cve/CVE-2017-17862" }, { "category": "external", "summary": "SUSE Bug 1073928 for CVE-2017-17862", "url": "https://bugzilla.suse.com/1073928" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2017-17862" }, { "cve": "CVE-2017-5123", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-5123" } ], "notes": [ { "category": "general", "text": "Insufficient data validation in waitid allowed an user to escape sandboxes on Linux.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-5123", "url": "https://www.suse.com/security/cve/CVE-2017-5123" }, { "category": "external", "summary": "SUSE Bug 1062473 for CVE-2017-5123", "url": "https://bugzilla.suse.com/1062473" }, { "category": "external", "summary": "SUSE Bug 1122971 for CVE-2017-5123", "url": "https://bugzilla.suse.com/1122971" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2017-5123" }, { "cve": "CVE-2017-5715", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-5715" } ], "notes": [ { "category": "general", "text": "Systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-5715", "url": "https://www.suse.com/security/cve/CVE-2017-5715" }, { "category": "external", "summary": "SUSE Bug 1068032 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1068032" }, { "category": "external", "summary": "SUSE Bug 1074562 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1074562" }, { "category": "external", "summary": "SUSE Bug 1074578 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1074578" }, { "category": "external", "summary": "SUSE Bug 1074701 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1074701" }, { "category": "external", "summary": "SUSE Bug 1074741 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1074741" }, { "category": "external", "summary": "SUSE Bug 1074919 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1074919" }, { "category": "external", "summary": "SUSE Bug 1075006 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1075006" }, { "category": "external", "summary": "SUSE Bug 1075007 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1075007" }, { "category": "external", "summary": "SUSE Bug 1075262 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1075262" }, { "category": "external", "summary": "SUSE Bug 1075419 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1075419" }, { "category": "external", "summary": "SUSE Bug 1076115 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1076115" }, { "category": "external", "summary": "SUSE Bug 1076372 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1076372" }, { "category": "external", "summary": "SUSE Bug 1076606 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1076606" }, { "category": "external", "summary": "SUSE Bug 1078353 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1078353" }, { "category": "external", "summary": "SUSE Bug 1080039 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1080039" }, { "category": "external", "summary": "SUSE Bug 1087887 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1087887" }, { "category": "external", "summary": "SUSE Bug 1087939 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1087939" }, { "category": "external", "summary": "SUSE Bug 1088147 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1088147" }, { "category": "external", "summary": "SUSE Bug 1089055 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1089055" }, { "category": "external", "summary": "SUSE Bug 1091815 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1091815" }, { "category": "external", "summary": "SUSE Bug 1095735 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1095735" }, { "category": "external", "summary": "SUSE Bug 1102517 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1102517" }, { "category": "external", "summary": "SUSE Bug 1105108 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1105108" }, { "category": "external", "summary": "SUSE Bug 1126516 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1126516" }, { "category": "external", "summary": "SUSE Bug 1173489 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1173489" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1178658" }, { "category": "external", "summary": "SUSE Bug 1201457 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1201457" }, { "category": "external", "summary": "SUSE Bug 1201877 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1201877" }, { "category": "external", "summary": "SUSE Bug 1203236 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1203236" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2017-5715" }, { "cve": "CVE-2017-5753", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-5753" } ], "notes": [ { "category": "general", "text": "Systems with microprocessors utilizing speculative execution and branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-5753", "url": "https://www.suse.com/security/cve/CVE-2017-5753" }, { "category": "external", "summary": "SUSE Bug 1068032 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1068032" }, { "category": "external", "summary": "SUSE Bug 1074562 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1074562" }, { "category": "external", "summary": "SUSE Bug 1074578 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1074578" }, { "category": "external", "summary": "SUSE Bug 1074701 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1074701" }, { "category": "external", "summary": "SUSE Bug 1075006 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1075006" }, { "category": "external", "summary": "SUSE Bug 1075419 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1075419" }, { "category": "external", "summary": "SUSE Bug 1075748 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1075748" }, { "category": "external", "summary": "SUSE Bug 1080039 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1080039" }, { "category": "external", "summary": "SUSE Bug 1087084 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1087084" }, { "category": "external", "summary": "SUSE Bug 1087939 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1087939" }, { "category": "external", "summary": "SUSE Bug 1089055 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1089055" }, { "category": "external", "summary": "SUSE Bug 1136865 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1136865" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1178658" }, { "category": "external", "summary": "SUSE Bug 1201877 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1201877" }, { "category": "external", "summary": "SUSE Bug 1209547 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1209547" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2017-5753" }, { "cve": "CVE-2017-5754", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-5754" } ], "notes": [ { "category": "general", "text": "Systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis of the data cache.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-5754", "url": "https://www.suse.com/security/cve/CVE-2017-5754" }, { "category": "external", "summary": "SUSE Bug 1068032 for CVE-2017-5754", "url": "https://bugzilla.suse.com/1068032" }, { "category": "external", "summary": "SUSE Bug 1074562 for CVE-2017-5754", "url": "https://bugzilla.suse.com/1074562" }, { "category": "external", "summary": "SUSE Bug 1074578 for CVE-2017-5754", "url": "https://bugzilla.suse.com/1074578" }, { "category": "external", "summary": "SUSE Bug 1074701 for CVE-2017-5754", "url": "https://bugzilla.suse.com/1074701" }, { "category": "external", "summary": "SUSE Bug 1075006 for CVE-2017-5754", "url": "https://bugzilla.suse.com/1075006" }, { "category": "external", "summary": "SUSE Bug 1075008 for CVE-2017-5754", "url": "https://bugzilla.suse.com/1075008" }, { "category": "external", "summary": "SUSE Bug 1087939 for CVE-2017-5754", "url": "https://bugzilla.suse.com/1087939" }, { "category": "external", "summary": "SUSE Bug 1089055 for CVE-2017-5754", "url": "https://bugzilla.suse.com/1089055" }, { "category": "external", "summary": "SUSE Bug 1115045 for CVE-2017-5754", "url": "https://bugzilla.suse.com/1115045" }, { "category": "external", "summary": "SUSE Bug 1136865 for CVE-2017-5754", "url": "https://bugzilla.suse.com/1136865" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2017-5754", "url": "https://bugzilla.suse.com/1178658" }, { "category": "external", "summary": "SUSE Bug 1201877 for CVE-2017-5754", "url": "https://bugzilla.suse.com/1201877" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2017-5754" }, { "cve": "CVE-2017-7541", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-7541" } ], "notes": [ { "category": "general", "text": "The brcmf_cfg80211_mgmt_tx function in drivers/net/wireless/broadcom/brcm80211/brcmfmac/cfg80211.c in the Linux kernel before 4.12.3 allows local users to cause a denial of service (buffer overflow and system crash) or possibly gain privileges via a crafted NL80211_CMD_FRAME Netlink packet.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-7541", "url": "https://www.suse.com/security/cve/CVE-2017-7541" }, { "category": "external", "summary": "SUSE Bug 1049645 for CVE-2017-7541", "url": "https://bugzilla.suse.com/1049645" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2017-7541" }, { "cve": "CVE-2017-7542", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-7542" } ], "notes": [ { "category": "general", "text": "The ip6_find_1stfragopt function in net/ipv6/output_core.c in the Linux kernel through 4.12.3 allows local users to cause a denial of service (integer overflow and infinite loop) by leveraging the ability to open a raw socket.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-7542", "url": "https://www.suse.com/security/cve/CVE-2017-7542" }, { "category": "external", "summary": "SUSE Bug 1049882 for CVE-2017-7542", "url": "https://bugzilla.suse.com/1049882" }, { "category": "external", "summary": "SUSE Bug 1061936 for CVE-2017-7542", "url": "https://bugzilla.suse.com/1061936" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2017-7542" }, { "cve": "CVE-2017-8824", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-8824" } ], "notes": [ { "category": "general", "text": "The dccp_disconnect function in net/dccp/proto.c in the Linux kernel through 4.14.3 allows local users to gain privileges or cause a denial of service (use-after-free) via an AF_UNSPEC connect system call during the DCCP_LISTEN state.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-8824", "url": "https://www.suse.com/security/cve/CVE-2017-8824" }, { "category": "external", "summary": "SUSE Bug 1070771 for CVE-2017-8824", "url": "https://bugzilla.suse.com/1070771" }, { "category": "external", "summary": "SUSE Bug 1076734 for CVE-2017-8824", "url": "https://bugzilla.suse.com/1076734" }, { "category": "external", "summary": "SUSE Bug 1092904 for CVE-2017-8824", "url": "https://bugzilla.suse.com/1092904" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2017-8824", "url": "https://bugzilla.suse.com/1115893" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2017-8824" }, { "cve": "CVE-2017-8831", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-8831" } ], "notes": [ { "category": "general", "text": "The saa7164_bus_get function in drivers/media/pci/saa7164/saa7164-bus.c in the Linux kernel through 4.11.5 allows local users to cause a denial of service (out-of-bounds array access) or possibly have unspecified other impact by changing a certain sequence-number value, aka a \"double fetch\" vulnerability.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-8831", "url": "https://www.suse.com/security/cve/CVE-2017-8831" }, { "category": "external", "summary": "SUSE Bug 1037994 for CVE-2017-8831", "url": "https://bugzilla.suse.com/1037994" }, { "category": "external", "summary": "SUSE Bug 1061936 for CVE-2017-8831", "url": "https://bugzilla.suse.com/1061936" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2017-8831", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2017-8831", "url": "https://bugzilla.suse.com/1115893" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2017-8831" }, { "cve": "CVE-2018-1000004", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-1000004" } ], "notes": [ { "category": "general", "text": "In the Linux kernel 4.12, 3.10, 2.6 and possibly earlier versions a race condition vulnerability exists in the sound system, this can lead to a deadlock and denial of service condition.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-1000004", "url": "https://www.suse.com/security/cve/CVE-2018-1000004" }, { "category": "external", "summary": "SUSE Bug 1076017 for CVE-2018-1000004", "url": "https://bugzilla.suse.com/1076017" }, { "category": "external", "summary": "SUSE Bug 1091815 for CVE-2018-1000004", "url": "https://bugzilla.suse.com/1091815" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2018-1000004" }, { "cve": "CVE-2018-10322", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-10322" } ], "notes": [ { "category": "general", "text": "The xfs_dinode_verify function in fs/xfs/libxfs/xfs_inode_buf.c in the Linux kernel through 4.16.3 allows local users to cause a denial of service (xfs_ilock_attr_map_shared invalid pointer dereference) via a crafted xfs image.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-10322", "url": "https://www.suse.com/security/cve/CVE-2018-10322" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-10322", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1090749 for CVE-2018-10322", "url": "https://bugzilla.suse.com/1090749" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2018-10322" }, { "cve": "CVE-2018-10323", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-10323" } ], "notes": [ { "category": "general", "text": "The xfs_bmap_extents_to_btree function in fs/xfs/libxfs/xfs_bmap.c in the Linux kernel through 4.16.3 allows local users to cause a denial of service (xfs_bmapi_write NULL pointer dereference) via a crafted xfs image.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-10323", "url": "https://www.suse.com/security/cve/CVE-2018-10323" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-10323", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1090717 for CVE-2018-10323", "url": "https://bugzilla.suse.com/1090717" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2018-10323" }, { "cve": "CVE-2018-1068", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-1068" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux 4.x kernel\u0027s implementation of 32-bit syscall interface for bridging. This allowed a privileged user to arbitrarily write to a limited range of kernel memory.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-1068", "url": "https://www.suse.com/security/cve/CVE-2018-1068" }, { "category": "external", "summary": "SUSE Bug 1085107 for CVE-2018-1068", "url": "https://bugzilla.suse.com/1085107" }, { "category": "external", "summary": "SUSE Bug 1085114 for CVE-2018-1068", "url": "https://bugzilla.suse.com/1085114" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-1068", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1123903 for CVE-2018-1068", "url": "https://bugzilla.suse.com/1123903" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2018-1068" }, { "cve": "CVE-2018-1118", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-1118" } ], "notes": [ { "category": "general", "text": "Linux kernel vhost since version 4.8 does not properly initialize memory in messages passed between virtual guests and the host operating system in the vhost/vhost.c:vhost_new_msg() function. This can allow local privileged users to read some kernel memory contents when reading from the /dev/vhost-net device file.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-1118", "url": "https://www.suse.com/security/cve/CVE-2018-1118" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-1118", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1092472 for CVE-2018-1118", "url": "https://bugzilla.suse.com/1092472" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2018-1118" }, { "cve": "CVE-2018-12232", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-12232" } ], "notes": [ { "category": "general", "text": "In net/socket.c in the Linux kernel through 4.17.1, there is a race condition between fchownat and close in cases where they target the same socket file descriptor, related to the sock_close and sockfs_setattr functions. fchownat does not increment the file descriptor reference count, which allows close to set the socket to NULL during fchownat\u0027s execution, leading to a NULL pointer dereference and system crash.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-12232", "url": "https://www.suse.com/security/cve/CVE-2018-12232" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-12232", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1097593 for CVE-2018-12232", "url": "https://bugzilla.suse.com/1097593" }, { "category": "external", "summary": "SUSE Bug 1125907 for CVE-2018-12232", "url": "https://bugzilla.suse.com/1125907" }, { "category": "external", "summary": "SUSE Bug 1127757 for CVE-2018-12232", "url": "https://bugzilla.suse.com/1127757" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2018-12232" }, { "cve": "CVE-2018-12714", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-12714" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel through 4.17.2. The filter parsing in kernel/trace/trace_events_filter.c could be called with no filter, which is an N=0 case when it expected at least one line to have been read, thus making the N-1 index invalid. This allows attackers to cause a denial of service (slab out-of-bounds write) or possibly have unspecified other impact via crafted perf_event_open and mmap system calls.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-12714", "url": "https://www.suse.com/security/cve/CVE-2018-12714" }, { "category": "external", "summary": "SUSE Bug 1098933 for CVE-2018-12714", "url": "https://bugzilla.suse.com/1098933" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2018-12714" }, { "cve": "CVE-2018-13053", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-13053" } ], "notes": [ { "category": "general", "text": "The alarm_timer_nsleep function in kernel/time/alarmtimer.c in the Linux kernel through 4.17.3 has an integer overflow via a large relative timeout because ktime_add_safe is not used.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-13053", "url": "https://www.suse.com/security/cve/CVE-2018-13053" }, { "category": "external", "summary": "SUSE Bug 1099924 for CVE-2018-13053", "url": "https://bugzilla.suse.com/1099924" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2018-13053", "url": "https://bugzilla.suse.com/1115893" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.3, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "low" } ], "title": "CVE-2018-13053" }, { "cve": "CVE-2018-18710", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-18710" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel through 4.19. An information leak in cdrom_ioctl_select_disc in drivers/cdrom/cdrom.c could be used by local attackers to read kernel memory because a cast from unsigned long to int interferes with bounds checking. This is similar to CVE-2018-10940 and CVE-2018-16658.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-18710", "url": "https://www.suse.com/security/cve/CVE-2018-18710" }, { "category": "external", "summary": "SUSE Bug 1113751 for CVE-2018-18710", "url": "https://bugzilla.suse.com/1113751" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2018-18710" }, { "cve": "CVE-2018-19824", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-19824" } ], "notes": [ { "category": "general", "text": "In the Linux kernel through 4.19.6, a local user could exploit a use-after-free in the ALSA driver by supplying a malicious USB Sound device (with zero interfaces) that is mishandled in usb_audio_probe in sound/usb/card.c.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-19824", "url": "https://www.suse.com/security/cve/CVE-2018-19824" }, { "category": "external", "summary": "SUSE Bug 1118152 for CVE-2018-19824", "url": "https://bugzilla.suse.com/1118152" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2018-19824" }, { "cve": "CVE-2018-5332", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-5332" } ], "notes": [ { "category": "general", "text": "In the Linux kernel through 3.2, the rds_message_alloc_sgs() function does not validate a value that is used during DMA page allocation, leading to a heap-based out-of-bounds write (related to the rds_rdma_extra_size function in net/rds/rdma.c).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-5332", "url": "https://www.suse.com/security/cve/CVE-2018-5332" }, { "category": "external", "summary": "SUSE Bug 1075621 for CVE-2018-5332", "url": "https://bugzilla.suse.com/1075621" }, { "category": "external", "summary": "SUSE Bug 1091815 for CVE-2018-5332", "url": "https://bugzilla.suse.com/1091815" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2018-5332", "url": "https://bugzilla.suse.com/1115893" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.6, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:L", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "low" } ], "title": "CVE-2018-5332" }, { "cve": "CVE-2018-5333", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-5333" } ], "notes": [ { "category": "general", "text": "In the Linux kernel through 4.14.13, the rds_cmsg_atomic function in net/rds/rdma.c mishandles cases where page pinning fails or an invalid address is supplied, leading to an rds_atomic_free_op NULL pointer dereference.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-5333", "url": "https://www.suse.com/security/cve/CVE-2018-5333" }, { "category": "external", "summary": "SUSE Bug 1075617 for CVE-2018-5333", "url": "https://bugzilla.suse.com/1075617" }, { "category": "external", "summary": "SUSE Bug 1091815 for CVE-2018-5333", "url": "https://bugzilla.suse.com/1091815" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 2.9, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "low" } ], "title": "CVE-2018-5333" }, { "cve": "CVE-2018-8043", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-8043" } ], "notes": [ { "category": "general", "text": "The unimac_mdio_probe function in drivers/net/phy/mdio-bcm-unimac.c in the Linux kernel through 4.15.8 does not validate certain resource availability, which allows local users to cause a denial of service (NULL pointer dereference).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-8043", "url": "https://www.suse.com/security/cve/CVE-2018-8043" }, { "category": "external", "summary": "SUSE Bug 1084829 for CVE-2018-8043", "url": "https://bugzilla.suse.com/1084829" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 0, "baseSeverity": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "low" } ], "title": "CVE-2018-8043" }, { "cve": "CVE-2018-8087", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-8087" } ], "notes": [ { "category": "general", "text": "Memory leak in the hwsim_new_radio_nl function in drivers/net/wireless/mac80211_hwsim.c in the Linux kernel through 4.15.9 allows local users to cause a denial of service (memory consumption) by triggering an out-of-array error case.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-8087", "url": "https://www.suse.com/security/cve/CVE-2018-8087" }, { "category": "external", "summary": "SUSE Bug 1085053 for CVE-2018-8087", "url": "https://bugzilla.suse.com/1085053" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2018-8087" }, { "cve": "CVE-2018-8822", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-8822" } ], "notes": [ { "category": "general", "text": "Incorrect buffer length handling in the ncp_read_kernel function in fs/ncpfs/ncplib_kernel.c in the Linux kernel through 4.15.11, and in drivers/staging/ncpfs/ncplib_kernel.c in the Linux kernel 4.16-rc through 4.16-rc6, could be exploited by malicious NCPFS servers to crash the kernel or execute code.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-8822", "url": "https://www.suse.com/security/cve/CVE-2018-8822" }, { "category": "external", "summary": "SUSE Bug 1086162 for CVE-2018-8822", "url": "https://bugzilla.suse.com/1086162" }, { "category": "external", "summary": "SUSE Bug 1090404 for CVE-2018-8822", "url": "https://bugzilla.suse.com/1090404" }, { "category": "external", "summary": "SUSE Bug 1091815 for CVE-2018-8822", "url": "https://bugzilla.suse.com/1091815" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2018-8822" }, { "cve": "CVE-2019-10207", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-10207" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel\u0027s Bluetooth implementation of UART, all versions kernel 3.x.x before 4.18.0 and kernel 5.x.x. An attacker with local access and write permissions to the Bluetooth hardware could use this flaw to issue a specially crafted ioctl function call and cause the system to crash.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-10207", "url": "https://www.suse.com/security/cve/CVE-2019-10207" }, { "category": "external", "summary": "SUSE Bug 1123959 for CVE-2019-10207", "url": "https://bugzilla.suse.com/1123959" }, { "category": "external", "summary": "SUSE Bug 1142857 for CVE-2019-10207", "url": "https://bugzilla.suse.com/1142857" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-10207" }, { "cve": "CVE-2019-11477", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-11477" } ], "notes": [ { "category": "general", "text": "Jonathan Looney discovered that the TCP_SKB_CB(skb)-\u003etcp_gso_segs value was subject to an integer overflow in the Linux kernel when handling TCP Selective Acknowledgments (SACKs). A remote attacker could use this to cause a denial of service. This has been fixed in stable kernel releases 4.4.182, 4.9.182, 4.14.127, 4.19.52, 5.1.11, and is fixed in commit 3b4929f65b0d8249f19a50245cd88ed1a2f78cff.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-11477", "url": "https://www.suse.com/security/cve/CVE-2019-11477" }, { "category": "external", "summary": "SUSE Bug 1132686 for CVE-2019-11477", "url": "https://bugzilla.suse.com/1132686" }, { "category": "external", "summary": "SUSE Bug 1137586 for CVE-2019-11477", "url": "https://bugzilla.suse.com/1137586" }, { "category": "external", "summary": "SUSE Bug 1142129 for CVE-2019-11477", "url": "https://bugzilla.suse.com/1142129" }, { "category": "external", "summary": "SUSE Bug 1153242 for CVE-2019-11477", "url": "https://bugzilla.suse.com/1153242" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.2, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2019-11477" }, { "cve": "CVE-2019-11478", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-11478" } ], "notes": [ { "category": "general", "text": "Jonathan Looney discovered that the TCP retransmission queue implementation in tcp_fragment in the Linux kernel could be fragmented when handling certain TCP Selective Acknowledgment (SACK) sequences. A remote attacker could use this to cause a denial of service. This has been fixed in stable kernel releases 4.4.182, 4.9.182, 4.14.127, 4.19.52, 5.1.11, and is fixed in commit f070ef2ac66716357066b683fb0baf55f8191a2e.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-11478", "url": "https://www.suse.com/security/cve/CVE-2019-11478" }, { "category": "external", "summary": "SUSE Bug 1132686 for CVE-2019-11478", "url": "https://bugzilla.suse.com/1132686" }, { "category": "external", "summary": "SUSE Bug 1137586 for CVE-2019-11478", "url": "https://bugzilla.suse.com/1137586" }, { "category": "external", "summary": "SUSE Bug 1142129 for CVE-2019-11478", "url": "https://bugzilla.suse.com/1142129" }, { "category": "external", "summary": "SUSE Bug 1143542 for CVE-2019-11478", "url": "https://bugzilla.suse.com/1143542" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2019-11478" }, { "cve": "CVE-2019-11479", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-11479" } ], "notes": [ { "category": "general", "text": "Jonathan Looney discovered that the Linux kernel default MSS is hard-coded to 48 bytes. This allows a remote peer to fragment TCP resend queues significantly more than if a larger MSS were enforced. A remote attacker could use this to cause a denial of service. This has been fixed in stable kernel releases 4.4.182, 4.9.182, 4.14.127, 4.19.52, 5.1.11, and is fixed in commits 967c05aee439e6e5d7d805e195b3a20ef5c433d6 and 5f3e2bf008c2221478101ee72f5cb4654b9fc363.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-11479", "url": "https://www.suse.com/security/cve/CVE-2019-11479" }, { "category": "external", "summary": "SUSE Bug 1132686 for CVE-2019-11479", "url": "https://bugzilla.suse.com/1132686" }, { "category": "external", "summary": "SUSE Bug 1137586 for CVE-2019-11479", "url": "https://bugzilla.suse.com/1137586" }, { "category": "external", "summary": "SUSE Bug 1142129 for CVE-2019-11479", "url": "https://bugzilla.suse.com/1142129" }, { "category": "external", "summary": "SUSE Bug 1143542 for CVE-2019-11479", "url": "https://bugzilla.suse.com/1143542" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2019-11479" }, { "cve": "CVE-2019-14615", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-14615" } ], "notes": [ { "category": "general", "text": "Insufficient control flow in certain data structures for some Intel(R) Processors with Intel(R) Processor Graphics may allow an unauthenticated user to potentially enable information disclosure via local access.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-14615", "url": "https://www.suse.com/security/cve/CVE-2019-14615" }, { "category": "external", "summary": "SUSE Bug 1160195 for CVE-2019-14615", "url": "https://bugzilla.suse.com/1160195" }, { "category": "external", "summary": "SUSE Bug 1165881 for CVE-2019-14615", "url": "https://bugzilla.suse.com/1165881" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-14615" }, { "cve": "CVE-2019-14814", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-14814" } ], "notes": [ { "category": "general", "text": "There is heap-based buffer overflow in Linux kernel, all versions up to, excluding 5.3, in the marvell wifi chip driver in Linux kernel, that allows local users to cause a denial of service(system crash) or possibly execute arbitrary code.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-14814", "url": "https://www.suse.com/security/cve/CVE-2019-14814" }, { "category": "external", "summary": "SUSE Bug 1146512 for CVE-2019-14814", "url": "https://bugzilla.suse.com/1146512" }, { "category": "external", "summary": "SUSE Bug 1173664 for CVE-2019-14814", "url": "https://bugzilla.suse.com/1173664" }, { "category": "external", "summary": "SUSE Bug 1173665 for CVE-2019-14814", "url": "https://bugzilla.suse.com/1173665" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2019-14814" }, { "cve": "CVE-2019-14896", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-14896" } ], "notes": [ { "category": "general", "text": "A heap-based buffer overflow vulnerability was found in the Linux kernel, version kernel-2.6.32, in Marvell WiFi chip driver. A remote attacker could cause a denial of service (system crash) or, possibly execute arbitrary code, when the lbs_ibss_join_existing function is called after a STA connects to an AP.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-14896", "url": "https://www.suse.com/security/cve/CVE-2019-14896" }, { "category": "external", "summary": "SUSE Bug 1157157 for CVE-2019-14896", "url": "https://bugzilla.suse.com/1157157" }, { "category": "external", "summary": "SUSE Bug 1160468 for CVE-2019-14896", "url": "https://bugzilla.suse.com/1160468" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2019-14896" }, { "cve": "CVE-2019-15030", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-15030" } ], "notes": [ { "category": "general", "text": "In the Linux kernel through 5.2.14 on the powerpc platform, a local user can read vector registers of other users\u0027 processes via a Facility Unavailable exception. To exploit the venerability, a local user starts a transaction (via the hardware transactional memory instruction tbegin) and then accesses vector registers. At some point, the vector registers will be corrupted with the values from a different local Linux process because of a missing arch/powerpc/kernel/process.c check.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-15030", "url": "https://www.suse.com/security/cve/CVE-2019-15030" }, { "category": "external", "summary": "SUSE Bug 1149713 for CVE-2019-15030", "url": "https://bugzilla.suse.com/1149713" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-15030" }, { "cve": "CVE-2019-15031", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-15031" } ], "notes": [ { "category": "general", "text": "In the Linux kernel through 5.2.14 on the powerpc platform, a local user can read vector registers of other users\u0027 processes via an interrupt. To exploit the venerability, a local user starts a transaction (via the hardware transactional memory instruction tbegin) and then accesses vector registers. At some point, the vector registers will be corrupted with the values from a different local Linux process, because MSR_TM_ACTIVE is misused in arch/powerpc/kernel/process.c.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-15031", "url": "https://www.suse.com/security/cve/CVE-2019-15031" }, { "category": "external", "summary": "SUSE Bug 1149713 for CVE-2019-15031", "url": "https://bugzilla.suse.com/1149713" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-15031" }, { "cve": "CVE-2019-15098", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-15098" } ], "notes": [ { "category": "general", "text": "drivers/net/wireless/ath/ath6kl/usb.c in the Linux kernel through 5.2.9 has a NULL pointer dereference via an incomplete address in an endpoint descriptor.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-15098", "url": "https://www.suse.com/security/cve/CVE-2019-15098" }, { "category": "external", "summary": "SUSE Bug 1146378 for CVE-2019-15098", "url": "https://bugzilla.suse.com/1146378" }, { "category": "external", "summary": "SUSE Bug 1146543 for CVE-2019-15098", "url": "https://bugzilla.suse.com/1146543" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-15098" }, { "cve": "CVE-2019-15099", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-15099" } ], "notes": [ { "category": "general", "text": "drivers/net/wireless/ath/ath10k/usb.c in the Linux kernel through 5.2.8 has a NULL pointer dereference via an incomplete address in an endpoint descriptor.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-15099", "url": "https://www.suse.com/security/cve/CVE-2019-15099" }, { "category": "external", "summary": "SUSE Bug 1146368 for CVE-2019-15099", "url": "https://bugzilla.suse.com/1146368" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-15099" }, { "cve": "CVE-2019-15290", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-15290" } ], "notes": [ { "category": "general", "text": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2019-15098. Reason: This candidate is a duplicate of CVE-2019-15098. Notes: All CVE users should reference CVE-2019-15098 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-15290", "url": "https://www.suse.com/security/cve/CVE-2019-15290" }, { "category": "external", "summary": "SUSE Bug 1146378 for CVE-2019-15290", "url": "https://bugzilla.suse.com/1146378" }, { "category": "external", "summary": "SUSE Bug 1146519 for CVE-2019-15290", "url": "https://bugzilla.suse.com/1146519" }, { "category": "external", "summary": "SUSE Bug 1146543 for CVE-2019-15290", "url": "https://bugzilla.suse.com/1146543" }, { "category": "external", "summary": "SUSE Bug 1158381 for CVE-2019-15290", "url": "https://bugzilla.suse.com/1158381" }, { "category": "external", "summary": "SUSE Bug 1158834 for CVE-2019-15290", "url": "https://bugzilla.suse.com/1158834" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-15290" }, { "cve": "CVE-2019-15504", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-15504" } ], "notes": [ { "category": "general", "text": "drivers/net/wireless/rsi/rsi_91x_usb.c in the Linux kernel through 5.2.9 has a Double Free via crafted USB device traffic (which may be remote via usbip or usbredir).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-15504", "url": "https://www.suse.com/security/cve/CVE-2019-15504" }, { "category": "external", "summary": "SUSE Bug 1147116 for CVE-2019-15504", "url": "https://bugzilla.suse.com/1147116" }, { "category": "external", "summary": "SUSE Bug 1185852 for CVE-2019-15504", "url": "https://bugzilla.suse.com/1185852" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2019-15504" }, { "cve": "CVE-2019-15902", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-15902" } ], "notes": [ { "category": "general", "text": "A backporting error was discovered in the Linux stable/longterm kernel 4.4.x through 4.4.190, 4.9.x through 4.9.190, 4.14.x through 4.14.141, 4.19.x through 4.19.69, and 5.2.x through 5.2.11. Misuse of the upstream \"x86/ptrace: Fix possible spectre-v1 in ptrace_get_debugreg()\" commit reintroduced the Spectre vulnerability that it aimed to eliminate. This occurred because the backport process depends on cherry picking specific commits, and because two (correctly ordered) code lines were swapped.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-15902", "url": "https://www.suse.com/security/cve/CVE-2019-15902" }, { "category": "external", "summary": "SUSE Bug 1149376 for CVE-2019-15902", "url": "https://bugzilla.suse.com/1149376" }, { "category": "external", "summary": "SUSE Bug 1155131 for CVE-2019-15902", "url": "https://bugzilla.suse.com/1155131" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-15902" }, { "cve": "CVE-2019-16231", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-16231" } ], "notes": [ { "category": "general", "text": "drivers/net/fjes/fjes_main.c in the Linux kernel 5.2.14 does not check the alloc_workqueue return value, leading to a NULL pointer dereference.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-16231", "url": "https://www.suse.com/security/cve/CVE-2019-16231" }, { "category": "external", "summary": "SUSE Bug 1150466 for CVE-2019-16231", "url": "https://bugzilla.suse.com/1150466" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "low" } ], "title": "CVE-2019-16231" }, { "cve": "CVE-2019-16232", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-16232" } ], "notes": [ { "category": "general", "text": "drivers/net/wireless/marvell/libertas/if_sdio.c in the Linux kernel 5.2.14 does not check the alloc_workqueue return value, leading to a NULL pointer dereference.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-16232", "url": "https://www.suse.com/security/cve/CVE-2019-16232" }, { "category": "external", "summary": "SUSE Bug 1150465 for CVE-2019-16232", "url": "https://bugzilla.suse.com/1150465" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "low" } ], "title": "CVE-2019-16232" }, { "cve": "CVE-2019-16234", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-16234" } ], "notes": [ { "category": "general", "text": "drivers/net/wireless/intel/iwlwifi/pcie/trans.c in the Linux kernel 5.2.14 does not check the alloc_workqueue return value, leading to a NULL pointer dereference.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-16234", "url": "https://www.suse.com/security/cve/CVE-2019-16234" }, { "category": "external", "summary": "SUSE Bug 1150452 for CVE-2019-16234", "url": "https://bugzilla.suse.com/1150452" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "low" } ], "title": "CVE-2019-16234" }, { "cve": "CVE-2019-17133", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-17133" } ], "notes": [ { "category": "general", "text": "In the Linux kernel through 5.3.2, cfg80211_mgd_wext_giwessid in net/wireless/wext-sme.c does not reject a long SSID IE, leading to a Buffer Overflow.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-17133", "url": "https://www.suse.com/security/cve/CVE-2019-17133" }, { "category": "external", "summary": "SUSE Bug 1153158 for CVE-2019-17133", "url": "https://bugzilla.suse.com/1153158" }, { "category": "external", "summary": "SUSE Bug 1153161 for CVE-2019-17133", "url": "https://bugzilla.suse.com/1153161" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2019-17133" }, { "cve": "CVE-2019-17666", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-17666" } ], "notes": [ { "category": "general", "text": "rtl_p2p_noa_ie in drivers/net/wireless/realtek/rtlwifi/ps.c in the Linux kernel through 5.3.6 lacks a certain upper-bound check, leading to a buffer overflow.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-17666", "url": "https://www.suse.com/security/cve/CVE-2019-17666" }, { "category": "external", "summary": "SUSE Bug 1154372 for CVE-2019-17666", "url": "https://bugzilla.suse.com/1154372" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-17666" }, { "cve": "CVE-2019-18808", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-18808" } ], "notes": [ { "category": "general", "text": "A memory leak in the ccp_run_sha_cmd() function in drivers/crypto/ccp/ccp-ops.c in the Linux kernel through 5.3.9 allows attackers to cause a denial of service (memory consumption), aka CID-128c66429247.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-18808", "url": "https://www.suse.com/security/cve/CVE-2019-18808" }, { "category": "external", "summary": "SUSE Bug 1156259 for CVE-2019-18808", "url": "https://bugzilla.suse.com/1156259" }, { "category": "external", "summary": "SUSE Bug 1189884 for CVE-2019-18808", "url": "https://bugzilla.suse.com/1189884" }, { "category": "external", "summary": "SUSE Bug 1190534 for CVE-2019-18808", "url": "https://bugzilla.suse.com/1190534" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-18808" }, { "cve": "CVE-2019-18812", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-18812" } ], "notes": [ { "category": "general", "text": "A memory leak in the sof_dfsentry_write() function in sound/soc/sof/debug.c in the Linux kernel through 5.3.9 allows attackers to cause a denial of service (memory consumption), aka CID-c0a333d842ef.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-18812", "url": "https://www.suse.com/security/cve/CVE-2019-18812" }, { "category": "external", "summary": "SUSE Bug 1156277 for CVE-2019-18812", "url": "https://bugzilla.suse.com/1156277" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-18812" }, { "cve": "CVE-2019-18813", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-18813" } ], "notes": [ { "category": "general", "text": "A memory leak in the dwc3_pci_probe() function in drivers/usb/dwc3/dwc3-pci.c in the Linux kernel through 5.3.9 allows attackers to cause a denial of service (memory consumption) by triggering platform_device_add_properties() failures, aka CID-9bbfceea12a8.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-18813", "url": "https://www.suse.com/security/cve/CVE-2019-18813" }, { "category": "external", "summary": "SUSE Bug 1156278 for CVE-2019-18813", "url": "https://bugzilla.suse.com/1156278" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-18813" }, { "cve": "CVE-2019-19252", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-19252" } ], "notes": [ { "category": "general", "text": "vcs_write in drivers/tty/vt/vc_screen.c in the Linux kernel through 5.3.13 does not prevent write access to vcsu devices, aka CID-0c9acb1af77a.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-19252", "url": "https://www.suse.com/security/cve/CVE-2019-19252" }, { "category": "external", "summary": "SUSE Bug 1157813 for CVE-2019-19252", "url": "https://bugzilla.suse.com/1157813" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-19252" }, { "cve": "CVE-2019-19332", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-19332" } ], "notes": [ { "category": "general", "text": "An out-of-bounds memory write issue was found in the Linux Kernel, version 3.13 through 5.4, in the way the Linux kernel\u0027s KVM hypervisor handled the \u0027KVM_GET_EMULATED_CPUID\u0027 ioctl(2) request to get CPUID features emulated by the KVM hypervisor. A user or process able to access the \u0027/dev/kvm\u0027 device could use this flaw to crash the system, resulting in a denial of service.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-19332", "url": "https://www.suse.com/security/cve/CVE-2019-19332" }, { "category": "external", "summary": "SUSE Bug 1158827 for CVE-2019-19332", "url": "https://bugzilla.suse.com/1158827" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-19332" }, { "cve": "CVE-2019-19338", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-19338" } ], "notes": [ { "category": "general", "text": "A flaw was found in the fix for CVE-2019-11135, in the Linux upstream kernel versions before 5.5 where, the way Intel CPUs handle speculative execution of instructions when a TSX Asynchronous Abort (TAA) error occurs. When a guest is running on a host CPU affected by the TAA flaw (TAA_NO=0), but is not affected by the MDS issue (MDS_NO=1), the guest was to clear the affected buffers by using a VERW instruction mechanism. But when the MDS_NO=1 bit was exported to the guests, the guests did not use the VERW mechanism to clear the affected buffers. This issue affects guests running on Cascade Lake CPUs and requires that host has \u0027TSX\u0027 enabled. Confidentiality of data is the highest threat associated with this vulnerability.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-19338", "url": "https://www.suse.com/security/cve/CVE-2019-19338" }, { "category": "external", "summary": "SUSE Bug 1158954 for CVE-2019-19338", "url": "https://bugzilla.suse.com/1158954" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-19338" }, { "cve": "CVE-2019-3016", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-3016" } ], "notes": [ { "category": "general", "text": "In a Linux KVM guest that has PV TLB enabled, a process in the guest kernel may be able to read memory locations from another process in the same guest. This problem is limit to the host running linux kernel 4.10 with a guest running linux kernel 4.16 or later. The problem mainly affects AMD processors but Intel CPUs cannot be ruled out.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-3016", "url": "https://www.suse.com/security/cve/CVE-2019-3016" }, { "category": "external", "summary": "SUSE Bug 1159281 for CVE-2019-3016", "url": "https://bugzilla.suse.com/1159281" }, { "category": "external", "summary": "SUSE Bug 1161154 for CVE-2019-3016", "url": "https://bugzilla.suse.com/1161154" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-3016" }, { "cve": "CVE-2019-3846", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-3846" } ], "notes": [ { "category": "general", "text": "A flaw that allowed an attacker to corrupt memory and possibly escalate privileges was found in the mwifiex kernel module while connecting to a malicious wireless network.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-3846", "url": "https://www.suse.com/security/cve/CVE-2019-3846" }, { "category": "external", "summary": "SUSE Bug 1136424 for CVE-2019-3846", "url": "https://bugzilla.suse.com/1136424" }, { "category": "external", "summary": "SUSE Bug 1136446 for CVE-2019-3846", "url": "https://bugzilla.suse.com/1136446" }, { "category": "external", "summary": "SUSE Bug 1156330 for CVE-2019-3846", "url": "https://bugzilla.suse.com/1156330" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2019-3846" }, { "cve": "CVE-2019-3882", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-3882" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel\u0027s vfio interface implementation that permits violation of the user\u0027s locked memory limit. If a device is bound to a vfio driver, such as vfio-pci, and the local attacker is administratively granted ownership of the device, it may cause a system memory exhaustion and thus a denial of service (DoS). Versions 3.10, 4.14 and 4.18 are vulnerable.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-3882", "url": "https://www.suse.com/security/cve/CVE-2019-3882" }, { "category": "external", "summary": "SUSE Bug 1131416 for CVE-2019-3882", "url": "https://bugzilla.suse.com/1131416" }, { "category": "external", "summary": "SUSE Bug 1131427 for CVE-2019-3882", "url": "https://bugzilla.suse.com/1131427" }, { "category": "external", "summary": "SUSE Bug 1133319 for CVE-2019-3882", "url": "https://bugzilla.suse.com/1133319" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-3882" }, { "cve": "CVE-2019-3887", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-3887" } ], "notes": [ { "category": "general", "text": "A flaw was found in the way KVM hypervisor handled x2APIC Machine Specific Rregister (MSR) access with nested(=1) virtualization enabled. In that, L1 guest could access L0\u0027s APIC register values via L2 guest, when \u0027virtualize x2APIC mode\u0027 is enabled. A guest could use this flaw to potentially crash the host kernel resulting in DoS issue. Kernel versions from 4.16 and newer are vulnerable to this issue.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-3887", "url": "https://www.suse.com/security/cve/CVE-2019-3887" }, { "category": "external", "summary": "SUSE Bug 1131800 for CVE-2019-3887", "url": "https://bugzilla.suse.com/1131800" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-3887" }, { "cve": "CVE-2019-6974", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-6974" } ], "notes": [ { "category": "general", "text": "In the Linux kernel before 4.20.8, kvm_ioctl_create_device in virt/kvm/kvm_main.c mishandles reference counting because of a race condition, leading to a use-after-free.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-6974", "url": "https://www.suse.com/security/cve/CVE-2019-6974" }, { "category": "external", "summary": "SUSE Bug 1124728 for CVE-2019-6974", "url": "https://bugzilla.suse.com/1124728" }, { "category": "external", "summary": "SUSE Bug 1124729 for CVE-2019-6974", "url": "https://bugzilla.suse.com/1124729" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2019-6974" }, { "cve": "CVE-2019-7221", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-7221" } ], "notes": [ { "category": "general", "text": "The KVM implementation in the Linux kernel through 4.20.5 has a Use-after-Free.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-7221", "url": "https://www.suse.com/security/cve/CVE-2019-7221" }, { "category": "external", "summary": "SUSE Bug 1124732 for CVE-2019-7221", "url": "https://bugzilla.suse.com/1124732" }, { "category": "external", "summary": "SUSE Bug 1124734 for CVE-2019-7221", "url": "https://bugzilla.suse.com/1124734" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2019-7221" }, { "cve": "CVE-2019-7222", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-7222" } ], "notes": [ { "category": "general", "text": "The KVM implementation in the Linux kernel through 4.20.5 has an Information Leak.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-7222", "url": "https://www.suse.com/security/cve/CVE-2019-7222" }, { "category": "external", "summary": "SUSE Bug 1124735 for CVE-2019-7222", "url": "https://bugzilla.suse.com/1124735" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 2.8, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "low" } ], "title": "CVE-2019-7222" }, { "cve": "CVE-2019-8564", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-8564" } ], "notes": [ { "category": "general", "text": "A logic issue was addressed with improved validation. This issue is fixed in macOS Mojave 10.14.4, Security Update 2019-002 High Sierra, Security Update 2019-002 Sierra. An attacker in a privileged network position can modify driver state.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-8564", "url": "https://www.suse.com/security/cve/CVE-2019-8564" }, { "category": "external", "summary": "SUSE Bug 1132673 for CVE-2019-8564", "url": "https://bugzilla.suse.com/1132673" }, { "category": "external", "summary": "SUSE Bug 1132828 for CVE-2019-8564", "url": "https://bugzilla.suse.com/1132828" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-8564" }, { "cve": "CVE-2019-8912", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-8912" } ], "notes": [ { "category": "general", "text": "In the Linux kernel through 4.20.11, af_alg_release() in crypto/af_alg.c neglects to set a NULL value for a certain structure member, which leads to a use-after-free in sockfs_setattr.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-8912", "url": "https://www.suse.com/security/cve/CVE-2019-8912" }, { "category": "external", "summary": "SUSE Bug 1125907 for CVE-2019-8912", "url": "https://bugzilla.suse.com/1125907" }, { "category": "external", "summary": "SUSE Bug 1126284 for CVE-2019-8912", "url": "https://bugzilla.suse.com/1126284" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2019-8912" }, { "cve": "CVE-2019-9500", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-9500" } ], "notes": [ { "category": "general", "text": "The Broadcom brcmfmac WiFi driver prior to commit 1b5e2423164b3670e8bc9174e4762d297990deff is vulnerable to a heap buffer overflow. If the Wake-up on Wireless LAN functionality is configured, a malicious event frame can be constructed to trigger an heap buffer overflow in the brcmf_wowl_nd_results function. This vulnerability can be exploited with compromised chipsets to compromise the host, or when used in combination with CVE-2019-9503, can be used remotely. In the worst case scenario, by sending specially-crafted WiFi packets, a remote, unauthenticated attacker may be able to execute arbitrary code on a vulnerable system. More typically, this vulnerability will result in denial-of-service conditions.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-9500", "url": "https://www.suse.com/security/cve/CVE-2019-9500" }, { "category": "external", "summary": "SUSE Bug 1132681 for CVE-2019-9500", "url": "https://bugzilla.suse.com/1132681" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-9500" }, { "cve": "CVE-2020-10135", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-10135" } ], "notes": [ { "category": "general", "text": "Legacy pairing and secure-connections pairing authentication in Bluetooth BR/EDR Core Specification v5.2 and earlier may allow an unauthenticated user to complete authentication without pairing credentials via adjacent access. An unauthenticated, adjacent attacker could impersonate a Bluetooth BR/EDR master or slave to pair with a previously paired remote device to successfully complete the authentication procedure without knowing the link key.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-10135", "url": "https://www.suse.com/security/cve/CVE-2020-10135" }, { "category": "external", "summary": "SUSE Bug 1171988 for CVE-2020-10135", "url": "https://bugzilla.suse.com/1171988" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2020-10135" }, { "cve": "CVE-2020-10766", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-10766" } ], "notes": [ { "category": "general", "text": "A logic bug flaw was found in Linux kernel before 5.8-rc1 in the implementation of SSBD. A bug in the logic handling allows an attacker with a local account to disable SSBD protection during a context switch when additional speculative execution mitigations are in place. This issue was introduced when the per task/process conditional STIPB switching was added on top of the existing SSBD switching. The highest threat from this vulnerability is to confidentiality.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-10766", "url": "https://www.suse.com/security/cve/CVE-2020-10766" }, { "category": "external", "summary": "SUSE Bug 1159281 for CVE-2020-10766", "url": "https://bugzilla.suse.com/1159281" }, { "category": "external", "summary": "SUSE Bug 1172781 for CVE-2020-10766", "url": "https://bugzilla.suse.com/1172781" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2020-10766" }, { "cve": "CVE-2020-10767", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-10767" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel before 5.8-rc1 in the implementation of the Enhanced IBPB (Indirect Branch Prediction Barrier). The IBPB mitigation will be disabled when STIBP is not available or when the Enhanced Indirect Branch Restricted Speculation (IBRS) is available. This flaw allows a local attacker to perform a Spectre V2 style attack when this configuration is active. The highest threat from this vulnerability is to confidentiality.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-10767", "url": "https://www.suse.com/security/cve/CVE-2020-10767" }, { "category": "external", "summary": "SUSE Bug 1159281 for CVE-2020-10767", "url": "https://bugzilla.suse.com/1159281" }, { "category": "external", "summary": "SUSE Bug 1172782 for CVE-2020-10767", "url": "https://bugzilla.suse.com/1172782" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2020-10767" }, { "cve": "CVE-2020-10768", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-10768" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux Kernel before 5.8-rc1 in the prctl() function, where it can be used to enable indirect branch speculation after it has been disabled. This call incorrectly reports it as being \u0027force disabled\u0027 when it is not and opens the system to Spectre v2 attacks. The highest threat from this vulnerability is to confidentiality.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-10768", "url": "https://www.suse.com/security/cve/CVE-2020-10768" }, { "category": "external", "summary": "SUSE Bug 1159281 for CVE-2020-10768", "url": "https://bugzilla.suse.com/1159281" }, { "category": "external", "summary": "SUSE Bug 1172783 for CVE-2020-10768", "url": "https://bugzilla.suse.com/1172783" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2020-10768" }, { "cve": "CVE-2020-12351", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-12351" } ], "notes": [ { "category": "general", "text": "Improper input validation in BlueZ may allow an unauthenticated user to potentially enable escalation of privilege via adjacent access.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-12351", "url": "https://www.suse.com/security/cve/CVE-2020-12351" }, { "category": "external", "summary": "SUSE Bug 1177724 for CVE-2020-12351", "url": "https://bugzilla.suse.com/1177724" }, { "category": "external", "summary": "SUSE Bug 1177729 for CVE-2020-12351", "url": "https://bugzilla.suse.com/1177729" }, { "category": "external", "summary": "SUSE Bug 1178397 for CVE-2020-12351", "url": "https://bugzilla.suse.com/1178397" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2020-12351" }, { "cve": "CVE-2020-12352", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-12352" } ], "notes": [ { "category": "general", "text": "Improper access control in BlueZ may allow an unauthenticated user to potentially enable information disclosure via adjacent access.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-12352", "url": "https://www.suse.com/security/cve/CVE-2020-12352" }, { "category": "external", "summary": "SUSE Bug 1177725 for CVE-2020-12352", "url": "https://bugzilla.suse.com/1177725" }, { "category": "external", "summary": "SUSE Bug 1178398 for CVE-2020-12352", "url": "https://bugzilla.suse.com/1178398" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.1, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2020-12352" }, { "cve": "CVE-2020-14331", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14331" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel\u0027s implementation of the invert video code on VGA consoles when a local attacker attempts to resize the console, calling an ioctl VT_RESIZE, which causes an out-of-bounds write to occur. This flaw allows a local user with access to the VGA console to crash the system, potentially escalating their privileges on the system. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14331", "url": "https://www.suse.com/security/cve/CVE-2020-14331" }, { "category": "external", "summary": "SUSE Bug 1174205 for CVE-2020-14331", "url": "https://bugzilla.suse.com/1174205" }, { "category": "external", "summary": "SUSE Bug 1174247 for CVE-2020-14331", "url": "https://bugzilla.suse.com/1174247" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2020-14331" }, { "cve": "CVE-2020-14386", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14386" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel before 5.9-rc4. Memory corruption can be exploited to gain root privileges from unprivileged processes. The highest threat from this vulnerability is to data confidentiality and integrity.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14386", "url": "https://www.suse.com/security/cve/CVE-2020-14386" }, { "category": "external", "summary": "SUSE Bug 1176069 for CVE-2020-14386", "url": "https://bugzilla.suse.com/1176069" }, { "category": "external", "summary": "SUSE Bug 1176072 for CVE-2020-14386", "url": "https://bugzilla.suse.com/1176072" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2020-14386" }, { "cve": "CVE-2020-24586", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-24586" } ], "notes": [ { "category": "general", "text": "The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn\u0027t require that received fragments be cleared from memory after (re)connecting to a network. Under the right circumstances, when another device sends fragmented frames encrypted using WEP, CCMP, or GCMP, this can be abused to inject arbitrary network packets and/or exfiltrate user data.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-24586", "url": "https://www.suse.com/security/cve/CVE-2020-24586" }, { "category": "external", "summary": "SUSE Bug 1185859 for CVE-2020-24586", "url": "https://bugzilla.suse.com/1185859" }, { "category": "external", "summary": "SUSE Bug 1192868 for CVE-2020-24586", "url": "https://bugzilla.suse.com/1192868" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2020-24586" }, { "cve": "CVE-2020-24587", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-24587" } ], "notes": [ { "category": "general", "text": "The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn\u0027t require that all fragments of a frame are encrypted under the same key. An adversary can abuse this to decrypt selected fragments when another device sends fragmented frames and the WEP, CCMP, or GCMP encryption key is periodically renewed.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-24587", "url": "https://www.suse.com/security/cve/CVE-2020-24587" }, { "category": "external", "summary": "SUSE Bug 1185859 for CVE-2020-24587", "url": "https://bugzilla.suse.com/1185859" }, { "category": "external", "summary": "SUSE Bug 1185862 for CVE-2020-24587", "url": "https://bugzilla.suse.com/1185862" }, { "category": "external", "summary": "SUSE Bug 1192868 for CVE-2020-24587", "url": "https://bugzilla.suse.com/1192868" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2020-24587" }, { "cve": "CVE-2020-24588", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-24588" } ], "notes": [ { "category": "general", "text": "The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn\u0027t require that the A-MSDU flag in the plaintext QoS header field is authenticated. Against devices that support receiving non-SSP A-MSDU frames (which is mandatory as part of 802.11n), an adversary can abuse this to inject arbitrary network packets.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-24588", "url": "https://www.suse.com/security/cve/CVE-2020-24588" }, { "category": "external", "summary": "SUSE Bug 1185861 for CVE-2020-24588", "url": "https://bugzilla.suse.com/1185861" }, { "category": "external", "summary": "SUSE Bug 1192868 for CVE-2020-24588", "url": "https://bugzilla.suse.com/1192868" }, { "category": "external", "summary": "SUSE Bug 1199701 for CVE-2020-24588", "url": "https://bugzilla.suse.com/1199701" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2020-24588" }, { "cve": "CVE-2020-25639", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-25639" } ], "notes": [ { "category": "general", "text": "A NULL pointer dereference flaw was found in the Linux kernel\u0027s GPU Nouveau driver functionality in versions prior to 5.12-rc1 in the way the user calls ioctl DRM_IOCTL_NOUVEAU_CHANNEL_ALLOC. This flaw allows a local user to crash the system.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-25639", "url": "https://www.suse.com/security/cve/CVE-2020-25639" }, { "category": "external", "summary": "SUSE Bug 1176846 for CVE-2020-25639", "url": "https://bugzilla.suse.com/1176846" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2020-25639" }, { "cve": "CVE-2020-25656", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-25656" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel. A use-after-free was found in the way the console subsystem was using ioctls KDGKBSENT and KDSKBSENT. A local user could use this flaw to get read memory access out of bounds. The highest threat from this vulnerability is to data confidentiality.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-25656", "url": "https://www.suse.com/security/cve/CVE-2020-25656" }, { "category": "external", "summary": "SUSE Bug 1177766 for CVE-2020-25656", "url": "https://bugzilla.suse.com/1177766" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2020-25656" }, { "cve": "CVE-2020-25668", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-25668" } ], "notes": [ { "category": "general", "text": "A flaw was found in Linux Kernel because access to the global variable fg_console is not properly synchronized leading to a use after free in con_font_op.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-25668", "url": "https://www.suse.com/security/cve/CVE-2020-25668" }, { "category": "external", "summary": "SUSE Bug 1178123 for CVE-2020-25668", "url": "https://bugzilla.suse.com/1178123" }, { "category": "external", "summary": "SUSE Bug 1178622 for CVE-2020-25668", "url": "https://bugzilla.suse.com/1178622" }, { "category": "external", "summary": "SUSE Bug 1196914 for CVE-2020-25668", "url": "https://bugzilla.suse.com/1196914" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2020-25668" }, { "cve": "CVE-2020-26141", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-26141" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the ALFA Windows 10 driver 6.1316.1209 for AWUS036H. The Wi-Fi implementation does not verify the Message Integrity Check (authenticity) of fragmented TKIP frames. An adversary can abuse this to inject and possibly decrypt packets in WPA or WPA2 networks that support the TKIP data-confidentiality protocol.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-26141", "url": "https://www.suse.com/security/cve/CVE-2020-26141" }, { "category": "external", "summary": "SUSE Bug 1185987 for CVE-2020-26141", "url": "https://bugzilla.suse.com/1185987" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2020-26141" }, { "cve": "CVE-2020-2732", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-2732" } ], "notes": [ { "category": "general", "text": "A flaw was discovered in the way that the KVM hypervisor handled instruction emulation for an L2 guest when nested virtualisation is enabled. Under some circumstances, an L2 guest may trick the L0 guest into accessing sensitive L1 resources that should be inaccessible to the L2 guest.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-2732", "url": "https://www.suse.com/security/cve/CVE-2020-2732" }, { "category": "external", "summary": "SUSE Bug 1163971 for CVE-2020-2732", "url": "https://bugzilla.suse.com/1163971" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.2, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:L/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "low" } ], "title": "CVE-2020-2732" }, { "cve": "CVE-2020-29660", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-29660" } ], "notes": [ { "category": "general", "text": "A locking inconsistency issue was discovered in the tty subsystem of the Linux kernel through 5.9.13. drivers/tty/tty_io.c and drivers/tty/tty_jobctrl.c may allow a read-after-free attack against TIOCGSID, aka CID-c8bcd9c5be24.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-29660", "url": "https://www.suse.com/security/cve/CVE-2020-29660" }, { "category": "external", "summary": "SUSE Bug 1179745 for CVE-2020-29660", "url": "https://bugzilla.suse.com/1179745" }, { "category": "external", "summary": "SUSE Bug 1179877 for CVE-2020-29660", "url": "https://bugzilla.suse.com/1179877" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2020-29660" }, { "cve": "CVE-2020-29661", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-29661" } ], "notes": [ { "category": "general", "text": "A locking issue was discovered in the tty subsystem of the Linux kernel through 5.9.13. drivers/tty/tty_jobctrl.c allows a use-after-free attack against TIOCSPGRP, aka CID-54ffccbf053b.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-29661", "url": "https://www.suse.com/security/cve/CVE-2020-29661" }, { "category": "external", "summary": "SUSE Bug 1179745 for CVE-2020-29661", "url": "https://bugzilla.suse.com/1179745" }, { "category": "external", "summary": "SUSE Bug 1179877 for CVE-2020-29661", "url": "https://bugzilla.suse.com/1179877" }, { "category": "external", "summary": "SUSE Bug 1214268 for CVE-2020-29661", "url": "https://bugzilla.suse.com/1214268" }, { "category": "external", "summary": "SUSE Bug 1218966 for CVE-2020-29661", "url": "https://bugzilla.suse.com/1218966" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2020-29661" }, { "cve": "CVE-2020-8648", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-8648" } ], "notes": [ { "category": "general", "text": "There is a use-after-free vulnerability in the Linux kernel through 5.5.2 in the n_tty_receive_buf_common function in drivers/tty/n_tty.c.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-8648", "url": "https://www.suse.com/security/cve/CVE-2020-8648" }, { "category": "external", "summary": "SUSE Bug 1162928 for CVE-2020-8648", "url": "https://bugzilla.suse.com/1162928" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2020-8648" }, { "cve": "CVE-2020-8694", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-8694" } ], "notes": [ { "category": "general", "text": "Insufficient access control in the Linux kernel driver for some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-8694", "url": "https://www.suse.com/security/cve/CVE-2020-8694" }, { "category": "external", "summary": "SUSE Bug 1170415 for CVE-2020-8694", "url": "https://bugzilla.suse.com/1170415" }, { "category": "external", "summary": "SUSE Bug 1170446 for CVE-2020-8694", "url": "https://bugzilla.suse.com/1170446" }, { "category": "external", "summary": "SUSE Bug 1178591 for CVE-2020-8694", "url": "https://bugzilla.suse.com/1178591" }, { "category": "external", "summary": "SUSE Bug 1178700 for CVE-2020-8694", "url": "https://bugzilla.suse.com/1178700" }, { "category": "external", "summary": "SUSE Bug 1179661 for CVE-2020-8694", "url": "https://bugzilla.suse.com/1179661" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2020-8694" }, { "cve": "CVE-2021-23133", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-23133" } ], "notes": [ { "category": "general", "text": "A race condition in Linux kernel SCTP sockets (net/sctp/socket.c) before 5.12-rc8 can lead to kernel privilege escalation from the context of a network service or an unprivileged process. If sctp_destroy_sock is called without sock_net(sk)-\u003esctp.addr_wq_lock then an element is removed from the auto_asconf_splist list without any proper locking. This can be exploited by an attacker with network service privileges to escalate to root or from the context of an unprivileged user directly if a BPF_CGROUP_INET_SOCK_CREATE is attached which denies creation of some SCTP socket.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-23133", "url": "https://www.suse.com/security/cve/CVE-2021-23133" }, { "category": "external", "summary": "SUSE Bug 1184675 for CVE-2021-23133", "url": "https://bugzilla.suse.com/1184675" }, { "category": "external", "summary": "SUSE Bug 1185901 for CVE-2021-23133", "url": "https://bugzilla.suse.com/1185901" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2021-23133" }, { "cve": "CVE-2021-26708", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-26708" } ], "notes": [ { "category": "general", "text": "A local privilege escalation was discovered in the Linux kernel before 5.10.13. Multiple race conditions in the AF_VSOCK implementation are caused by wrong locking in net/vmw_vsock/af_vsock.c. The race conditions were implicitly introduced in the commits that added VSOCK multi-transport support.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-26708", "url": "https://www.suse.com/security/cve/CVE-2021-26708" }, { "category": "external", "summary": "SUSE Bug 1181806 for CVE-2021-26708", "url": "https://bugzilla.suse.com/1181806" }, { "category": "external", "summary": "SUSE Bug 1183298 for CVE-2021-26708", "url": "https://bugzilla.suse.com/1183298" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2021-26708" }, { "cve": "CVE-2021-28971", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-28971" } ], "notes": [ { "category": "general", "text": "In intel_pmu_drain_pebs_nhm in arch/x86/events/intel/ds.c in the Linux kernel through 5.11.8 on some Haswell CPUs, userspace applications (such as perf-fuzzer) can cause a system crash because the PEBS status in a PEBS record is mishandled, aka CID-d88d05a9e0b6.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-28971", "url": "https://www.suse.com/security/cve/CVE-2021-28971" }, { "category": "external", "summary": "SUSE Bug 1184196 for CVE-2021-28971", "url": "https://bugzilla.suse.com/1184196" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2021-28971" }, { "cve": "CVE-2021-32606", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-32606" } ], "notes": [ { "category": "general", "text": "In the Linux kernel 5.11 through 5.12.2, isotp_setsockopt in net/can/isotp.c allows privilege escalation to root by leveraging a use-after-free. (This does not affect earlier versions that lack CAN ISOTP SF_BROADCAST support.)", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-32606", "url": "https://www.suse.com/security/cve/CVE-2021-32606" }, { "category": "external", "summary": "SUSE Bug 1185953 for CVE-2021-32606", "url": "https://bugzilla.suse.com/1185953" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2021-32606" }, { "cve": "CVE-2021-33909", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-33909" } ], "notes": [ { "category": "general", "text": "fs/seq_file.c in the Linux kernel 3.16 through 5.13.x before 5.13.4 does not properly restrict seq buffer allocations, leading to an integer overflow, an Out-of-bounds Write, and escalation to root by an unprivileged user, aka CID-8cae8cd89f05.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-33909", "url": "https://www.suse.com/security/cve/CVE-2021-33909" }, { "category": "external", "summary": "SUSE Bug 1188062 for CVE-2021-33909", "url": "https://bugzilla.suse.com/1188062" }, { "category": "external", "summary": "SUSE Bug 1188063 for CVE-2021-33909", "url": "https://bugzilla.suse.com/1188063" }, { "category": "external", "summary": "SUSE Bug 1188257 for CVE-2021-33909", "url": "https://bugzilla.suse.com/1188257" }, { "category": "external", "summary": "SUSE Bug 1189302 for CVE-2021-33909", "url": "https://bugzilla.suse.com/1189302" }, { "category": "external", "summary": "SUSE Bug 1190859 for CVE-2021-33909", "url": "https://bugzilla.suse.com/1190859" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2021-33909" }, { "cve": "CVE-2021-3483", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-3483" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Nosy driver in the Linux kernel. This issue allows a device to be inserted twice into a doubly-linked list, leading to a use-after-free when one of these devices is removed. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability. Versions before kernel 5.12-rc6 are affected", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-3483", "url": "https://www.suse.com/security/cve/CVE-2021-3483" }, { "category": "external", "summary": "SUSE Bug 1184393 for CVE-2021-3483", "url": "https://bugzilla.suse.com/1184393" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2021-3483" }, { "cve": "CVE-2021-3489", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-3489" } ], "notes": [ { "category": "general", "text": "The eBPF RINGBUF bpf_ringbuf_reserve() function in the Linux kernel did not check that the allocated size was smaller than the ringbuf size, allowing an attacker to perform out-of-bounds writes within the kernel and therefore, arbitrary code execution. This issue was fixed via commit 4b81ccebaeee (\"bpf, ringbuf: Deny reserve of buffers larger than ringbuf\") (v5.13-rc4) and backported to the stable kernels in v5.12.4, v5.11.21, and v5.10.37. It was introduced via 457f44363a88 (\"bpf: Implement BPF ring buffer and verifier support for it\") (v5.8-rc1).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-3489", "url": "https://www.suse.com/security/cve/CVE-2021-3489" }, { "category": "external", "summary": "SUSE Bug 1185640 for CVE-2021-3489", "url": "https://bugzilla.suse.com/1185640" }, { "category": "external", "summary": "SUSE Bug 1185856 for CVE-2021-3489", "url": "https://bugzilla.suse.com/1185856" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2021-3489" }, { "cve": "CVE-2021-3490", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-3490" } ], "notes": [ { "category": "general", "text": "The eBPF ALU32 bounds tracking for bitwise ops (AND, OR and XOR) in the Linux kernel did not properly update 32-bit bounds, which could be turned into out of bounds reads and writes in the Linux kernel and therefore, arbitrary code execution. This issue was fixed via commit 049c4e13714e (\"bpf: Fix alu32 const subreg bound tracking on bitwise operations\") (v5.13-rc4) and backported to the stable kernels in v5.12.4, v5.11.21, and v5.10.37. The AND/OR issues were introduced by commit 3f50f132d840 (\"bpf: Verifier, do explicit ALU32 bounds tracking\") (5.7-rc1) and the XOR variant was introduced by 2921c90d4718 (\"bpf:Fix a verifier failure with xor\") ( 5.10-rc1).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-3490", "url": "https://www.suse.com/security/cve/CVE-2021-3490" }, { "category": "external", "summary": "SUSE Bug 1185641 for CVE-2021-3490", "url": "https://bugzilla.suse.com/1185641" }, { "category": "external", "summary": "SUSE Bug 1185796 for CVE-2021-3490", "url": "https://bugzilla.suse.com/1185796" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2021-3490" }, { "cve": "CVE-2021-3491", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-3491" } ], "notes": [ { "category": "general", "text": "The io_uring subsystem in the Linux kernel allowed the MAX_RW_COUNT limit to be bypassed in the PROVIDE_BUFFERS operation, which led to negative values being usedin mem_rw when reading /proc/\u003cPID\u003e/mem. This could be used to create a heap overflow leading to arbitrary code execution in the kernel. It was addressed via commit d1f82808877b (\"io_uring: truncate lengths larger than MAX_RW_COUNT on provide buffers\") (v5.13-rc1) and backported to the stable kernels in v5.12.4, v5.11.21, and v5.10.37. It was introduced in ddf0322db79c (\"io_uring: add IORING_OP_PROVIDE_BUFFERS\") (v5.7-rc1).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-3491", "url": "https://www.suse.com/security/cve/CVE-2021-3491" }, { "category": "external", "summary": "SUSE Bug 1185642 for CVE-2021-3491", "url": "https://bugzilla.suse.com/1185642" }, { "category": "external", "summary": "SUSE Bug 1187090 for CVE-2021-3491", "url": "https://bugzilla.suse.com/1187090" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2021-3491" }, { "cve": "CVE-2021-3640", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-3640" } ], "notes": [ { "category": "general", "text": "A flaw use-after-free in function sco_sock_sendmsg() of the Linux kernel HCI subsystem was found in the way user calls ioct UFFDIO_REGISTER or other way triggers race condition of the call sco_conn_del() together with the call sco_sock_sendmsg() with the expected controllable faulting memory page. A privileged local user could use this flaw to crash the system or escalate their privileges on the system.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-3640", "url": "https://www.suse.com/security/cve/CVE-2021-3640" }, { "category": "external", "summary": "SUSE Bug 1188172 for CVE-2021-3640", "url": "https://bugzilla.suse.com/1188172" }, { "category": "external", "summary": "SUSE Bug 1188613 for CVE-2021-3640", "url": "https://bugzilla.suse.com/1188613" }, { "category": "external", "summary": "SUSE Bug 1191530 for CVE-2021-3640", "url": "https://bugzilla.suse.com/1191530" }, { "category": "external", "summary": "SUSE Bug 1196810 for CVE-2021-3640", "url": "https://bugzilla.suse.com/1196810" }, { "category": "external", "summary": "SUSE Bug 1196914 for CVE-2021-3640", "url": "https://bugzilla.suse.com/1196914" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2021-3640" }, { "cve": "CVE-2021-3653", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-3653" } ], "notes": [ { "category": "general", "text": "A flaw was found in the KVM\u0027s AMD code for supporting SVM nested virtualization. The flaw occurs when processing the VMCB (virtual machine control block) provided by the L1 guest to spawn/handle a nested guest (L2). Due to improper validation of the \"int_ctl\" field, this issue could allow a malicious L1 to enable AVIC support (Advanced Virtual Interrupt Controller) for the L2 guest. As a result, the L2 guest would be allowed to read/write physical pages of the host, resulting in a crash of the entire system, leak of sensitive data or potential guest-to-host escape. This flaw affects Linux kernel versions prior to 5.14-rc7.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-3653", "url": "https://www.suse.com/security/cve/CVE-2021-3653" }, { "category": "external", "summary": "SUSE Bug 1189399 for CVE-2021-3653", "url": "https://bugzilla.suse.com/1189399" }, { "category": "external", "summary": "SUSE Bug 1189420 for CVE-2021-3653", "url": "https://bugzilla.suse.com/1189420" }, { "category": "external", "summary": "SUSE Bug 1196914 for CVE-2021-3653", "url": "https://bugzilla.suse.com/1196914" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2021-3653" }, { "cve": "CVE-2021-3656", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-3656" } ], "notes": [ { "category": "general", "text": "A flaw was found in the KVM\u0027s AMD code for supporting SVM nested virtualization. The flaw occurs when processing the VMCB (virtual machine control block) provided by the L1 guest to spawn/handle a nested guest (L2). Due to improper validation of the \"virt_ext\" field, this issue could allow a malicious L1 to disable both VMLOAD/VMSAVE intercepts and VLS (Virtual VMLOAD/VMSAVE) for the L2 guest. As a result, the L2 guest would be allowed to read/write physical pages of the host, resulting in a crash of the entire system, leak of sensitive data or potential guest-to-host escape.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-3656", "url": "https://www.suse.com/security/cve/CVE-2021-3656" }, { "category": "external", "summary": "SUSE Bug 1189400 for CVE-2021-3656", "url": "https://bugzilla.suse.com/1189400" }, { "category": "external", "summary": "SUSE Bug 1189418 for CVE-2021-3656", "url": "https://bugzilla.suse.com/1189418" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2021-3656" }, { "cve": "CVE-2021-3744", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-3744" } ], "notes": [ { "category": "general", "text": "A memory leak flaw was found in the Linux kernel in the ccp_run_aes_gcm_cmd() function in drivers/crypto/ccp/ccp-ops.c, which allows attackers to cause a denial of service (memory consumption). This vulnerability is similar with the older CVE-2019-18808.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-3744", "url": "https://www.suse.com/security/cve/CVE-2021-3744" }, { "category": "external", "summary": "SUSE Bug 1189884 for CVE-2021-3744", "url": "https://bugzilla.suse.com/1189884" }, { "category": "external", "summary": "SUSE Bug 1190534 for CVE-2021-3744", "url": "https://bugzilla.suse.com/1190534" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2021-3744" }, { "cve": "CVE-2021-3753", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-3753" } ], "notes": [ { "category": "general", "text": "A race problem was seen in the vt_k_ioctl in drivers/tty/vt/vt_ioctl.c in the Linux kernel, which may cause an out of bounds read in vt as the write access to vc_mode is not protected by lock-in vt_ioctl (KDSETMDE). The highest threat from this vulnerability is to data confidentiality.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-3753", "url": "https://www.suse.com/security/cve/CVE-2021-3753" }, { "category": "external", "summary": "SUSE Bug 1190025 for CVE-2021-3753", "url": "https://bugzilla.suse.com/1190025" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 2.9, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "low" } ], "title": "CVE-2021-3753" }, { "cve": "CVE-2021-37576", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-37576" } ], "notes": [ { "category": "general", "text": "arch/powerpc/kvm/book3s_rtas.c in the Linux kernel through 5.13.5 on the powerpc platform allows KVM guest OS users to cause host OS memory corruption via rtas_args.nargs, aka CID-f62f3c20647e.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-37576", "url": "https://www.suse.com/security/cve/CVE-2021-37576" }, { "category": "external", "summary": "SUSE Bug 1188838 for CVE-2021-37576", "url": "https://bugzilla.suse.com/1188838" }, { "category": "external", "summary": "SUSE Bug 1188842 for CVE-2021-37576", "url": "https://bugzilla.suse.com/1188842" }, { "category": "external", "summary": "SUSE Bug 1190276 for CVE-2021-37576", "url": "https://bugzilla.suse.com/1190276" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2021-37576" }, { "cve": "CVE-2021-3759", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-3759" } ], "notes": [ { "category": "general", "text": "A memory overflow vulnerability was found in the Linux kernel\u0027s ipc functionality of the memcg subsystem, in the way a user calls the semget function multiple times, creating semaphores. This flaw allows a local user to starve the resources, causing a denial of service. The highest threat from this vulnerability is to system availability.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-3759", "url": "https://www.suse.com/security/cve/CVE-2021-3759" }, { "category": "external", "summary": "SUSE Bug 1190115 for CVE-2021-3759", "url": "https://bugzilla.suse.com/1190115" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2021-3759" }, { "cve": "CVE-2021-38166", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-38166" } ], "notes": [ { "category": "general", "text": "In kernel/bpf/hashtab.c in the Linux kernel through 5.13.8, there is an integer overflow and out-of-bounds write when many elements are placed in a single bucket. NOTE: exploitation might be impractical without the CAP_SYS_ADMIN capability.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-38166", "url": "https://www.suse.com/security/cve/CVE-2021-38166" }, { "category": "external", "summary": "SUSE Bug 1189233 for CVE-2021-38166", "url": "https://bugzilla.suse.com/1189233" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2021-38166" } ] }
opensuse-su-2024:13704-1
Vulnerability from csaf_opensuse
Published
2024-06-15 00:00
Modified
2024-06-15 00:00
Summary
kernel-devel-longterm-6.6.17-1.1 on GA media
Notes
Title of the patch
kernel-devel-longterm-6.6.17-1.1 on GA media
Description of the patch
These are all security issues fixed in the kernel-devel-longterm-6.6.17-1.1 package on the GA media of openSUSE Tumbleweed.
Patchnames
openSUSE-Tumbleweed-2024-13704
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "kernel-devel-longterm-6.6.17-1.1 on GA media", "title": "Title of the patch" }, { "category": "description", "text": "These are all security issues fixed in the kernel-devel-longterm-6.6.17-1.1 package on the GA media of openSUSE Tumbleweed.", "title": "Description of the patch" }, { "category": "details", "text": "openSUSE-Tumbleweed-2024-13704", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2024_13704-1.json" }, { "category": "self", "summary": "SUSE CVE CVE-2016-3695 page", "url": "https://www.suse.com/security/cve/CVE-2016-3695/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-1000251 page", "url": "https://www.suse.com/security/cve/CVE-2017-1000251/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-12153 page", "url": "https://www.suse.com/security/cve/CVE-2017-12153/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-13080 page", "url": "https://www.suse.com/security/cve/CVE-2017-13080/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-14051 page", "url": "https://www.suse.com/security/cve/CVE-2017-14051/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-15129 page", "url": "https://www.suse.com/security/cve/CVE-2017-15129/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-15265 page", "url": "https://www.suse.com/security/cve/CVE-2017-15265/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-16536 page", "url": "https://www.suse.com/security/cve/CVE-2017-16536/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-16537 page", "url": "https://www.suse.com/security/cve/CVE-2017-16537/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-16645 page", "url": "https://www.suse.com/security/cve/CVE-2017-16645/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-16646 page", "url": "https://www.suse.com/security/cve/CVE-2017-16646/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-16647 page", "url": "https://www.suse.com/security/cve/CVE-2017-16647/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-16648 page", "url": "https://www.suse.com/security/cve/CVE-2017-16648/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-16995 page", "url": "https://www.suse.com/security/cve/CVE-2017-16995/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-16996 page", "url": "https://www.suse.com/security/cve/CVE-2017-16996/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-17448 page", "url": "https://www.suse.com/security/cve/CVE-2017-17448/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-17449 page", "url": "https://www.suse.com/security/cve/CVE-2017-17449/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-17450 page", "url": "https://www.suse.com/security/cve/CVE-2017-17450/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-17852 page", "url": "https://www.suse.com/security/cve/CVE-2017-17852/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-17853 page", "url": "https://www.suse.com/security/cve/CVE-2017-17853/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-17854 page", "url": "https://www.suse.com/security/cve/CVE-2017-17854/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-17855 page", "url": "https://www.suse.com/security/cve/CVE-2017-17855/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-17856 page", "url": "https://www.suse.com/security/cve/CVE-2017-17856/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-17857 page", "url": "https://www.suse.com/security/cve/CVE-2017-17857/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-17862 page", "url": "https://www.suse.com/security/cve/CVE-2017-17862/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-5123 page", "url": "https://www.suse.com/security/cve/CVE-2017-5123/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-5715 page", "url": "https://www.suse.com/security/cve/CVE-2017-5715/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-5753 page", "url": "https://www.suse.com/security/cve/CVE-2017-5753/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-5754 page", "url": "https://www.suse.com/security/cve/CVE-2017-5754/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-7541 page", "url": "https://www.suse.com/security/cve/CVE-2017-7541/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-7542 page", "url": "https://www.suse.com/security/cve/CVE-2017-7542/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-8824 page", "url": "https://www.suse.com/security/cve/CVE-2017-8824/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-8831 page", "url": "https://www.suse.com/security/cve/CVE-2017-8831/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-1000004 page", "url": "https://www.suse.com/security/cve/CVE-2018-1000004/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-10322 page", "url": "https://www.suse.com/security/cve/CVE-2018-10322/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-10323 page", "url": "https://www.suse.com/security/cve/CVE-2018-10323/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-1068 page", "url": "https://www.suse.com/security/cve/CVE-2018-1068/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-1118 page", "url": "https://www.suse.com/security/cve/CVE-2018-1118/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-12232 page", "url": "https://www.suse.com/security/cve/CVE-2018-12232/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-12714 page", "url": "https://www.suse.com/security/cve/CVE-2018-12714/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-13053 page", "url": "https://www.suse.com/security/cve/CVE-2018-13053/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-18710 page", "url": "https://www.suse.com/security/cve/CVE-2018-18710/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-19824 page", "url": "https://www.suse.com/security/cve/CVE-2018-19824/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-5332 page", "url": "https://www.suse.com/security/cve/CVE-2018-5332/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-5333 page", "url": "https://www.suse.com/security/cve/CVE-2018-5333/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-8043 page", "url": "https://www.suse.com/security/cve/CVE-2018-8043/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-8087 page", "url": "https://www.suse.com/security/cve/CVE-2018-8087/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-8822 page", "url": "https://www.suse.com/security/cve/CVE-2018-8822/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-10207 page", "url": "https://www.suse.com/security/cve/CVE-2019-10207/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-11477 page", "url": "https://www.suse.com/security/cve/CVE-2019-11477/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-11478 page", "url": "https://www.suse.com/security/cve/CVE-2019-11478/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-11479 page", "url": "https://www.suse.com/security/cve/CVE-2019-11479/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-14615 page", "url": "https://www.suse.com/security/cve/CVE-2019-14615/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-14814 page", "url": "https://www.suse.com/security/cve/CVE-2019-14814/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-14896 page", "url": "https://www.suse.com/security/cve/CVE-2019-14896/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-15030 page", "url": "https://www.suse.com/security/cve/CVE-2019-15030/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-15031 page", "url": "https://www.suse.com/security/cve/CVE-2019-15031/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-15098 page", "url": "https://www.suse.com/security/cve/CVE-2019-15098/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-15099 page", "url": "https://www.suse.com/security/cve/CVE-2019-15099/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-15290 page", "url": "https://www.suse.com/security/cve/CVE-2019-15290/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-15504 page", "url": "https://www.suse.com/security/cve/CVE-2019-15504/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-15902 page", "url": "https://www.suse.com/security/cve/CVE-2019-15902/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-16231 page", "url": "https://www.suse.com/security/cve/CVE-2019-16231/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-16232 page", "url": "https://www.suse.com/security/cve/CVE-2019-16232/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-16234 page", "url": "https://www.suse.com/security/cve/CVE-2019-16234/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-17133 page", "url": "https://www.suse.com/security/cve/CVE-2019-17133/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-17666 page", "url": "https://www.suse.com/security/cve/CVE-2019-17666/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-18808 page", "url": "https://www.suse.com/security/cve/CVE-2019-18808/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-18812 page", "url": "https://www.suse.com/security/cve/CVE-2019-18812/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-18813 page", "url": "https://www.suse.com/security/cve/CVE-2019-18813/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-19252 page", "url": "https://www.suse.com/security/cve/CVE-2019-19252/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-19332 page", "url": "https://www.suse.com/security/cve/CVE-2019-19332/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-19338 page", "url": "https://www.suse.com/security/cve/CVE-2019-19338/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-3016 page", "url": "https://www.suse.com/security/cve/CVE-2019-3016/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-3846 page", "url": "https://www.suse.com/security/cve/CVE-2019-3846/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-3882 page", "url": "https://www.suse.com/security/cve/CVE-2019-3882/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-3887 page", "url": "https://www.suse.com/security/cve/CVE-2019-3887/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-6974 page", "url": "https://www.suse.com/security/cve/CVE-2019-6974/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-7221 page", "url": "https://www.suse.com/security/cve/CVE-2019-7221/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-7222 page", "url": "https://www.suse.com/security/cve/CVE-2019-7222/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-8564 page", "url": "https://www.suse.com/security/cve/CVE-2019-8564/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-8912 page", "url": "https://www.suse.com/security/cve/CVE-2019-8912/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-9500 page", "url": "https://www.suse.com/security/cve/CVE-2019-9500/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-10135 page", "url": "https://www.suse.com/security/cve/CVE-2020-10135/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-10766 page", "url": "https://www.suse.com/security/cve/CVE-2020-10766/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-10767 page", "url": "https://www.suse.com/security/cve/CVE-2020-10767/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-10768 page", "url": "https://www.suse.com/security/cve/CVE-2020-10768/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-12351 page", "url": "https://www.suse.com/security/cve/CVE-2020-12351/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-12352 page", "url": "https://www.suse.com/security/cve/CVE-2020-12352/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14331 page", "url": "https://www.suse.com/security/cve/CVE-2020-14331/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14386 page", "url": "https://www.suse.com/security/cve/CVE-2020-14386/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-24586 page", "url": "https://www.suse.com/security/cve/CVE-2020-24586/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-24587 page", "url": "https://www.suse.com/security/cve/CVE-2020-24587/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-24588 page", "url": "https://www.suse.com/security/cve/CVE-2020-24588/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-25639 page", "url": "https://www.suse.com/security/cve/CVE-2020-25639/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-25656 page", "url": "https://www.suse.com/security/cve/CVE-2020-25656/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-25668 page", "url": "https://www.suse.com/security/cve/CVE-2020-25668/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-26141 page", "url": "https://www.suse.com/security/cve/CVE-2020-26141/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-2732 page", "url": "https://www.suse.com/security/cve/CVE-2020-2732/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-29660 page", "url": "https://www.suse.com/security/cve/CVE-2020-29660/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-29661 page", "url": "https://www.suse.com/security/cve/CVE-2020-29661/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-8648 page", "url": "https://www.suse.com/security/cve/CVE-2020-8648/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-8694 page", "url": "https://www.suse.com/security/cve/CVE-2020-8694/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-23133 page", "url": "https://www.suse.com/security/cve/CVE-2021-23133/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-26708 page", "url": "https://www.suse.com/security/cve/CVE-2021-26708/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-28971 page", "url": "https://www.suse.com/security/cve/CVE-2021-28971/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-32606 page", "url": "https://www.suse.com/security/cve/CVE-2021-32606/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-33909 page", "url": "https://www.suse.com/security/cve/CVE-2021-33909/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-3483 page", "url": "https://www.suse.com/security/cve/CVE-2021-3483/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-3489 page", "url": "https://www.suse.com/security/cve/CVE-2021-3489/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-3490 page", "url": "https://www.suse.com/security/cve/CVE-2021-3490/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-3491 page", "url": "https://www.suse.com/security/cve/CVE-2021-3491/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-3542 page", "url": "https://www.suse.com/security/cve/CVE-2021-3542/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-3640 page", "url": "https://www.suse.com/security/cve/CVE-2021-3640/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-3653 page", "url": "https://www.suse.com/security/cve/CVE-2021-3653/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-3656 page", "url": "https://www.suse.com/security/cve/CVE-2021-3656/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-3744 page", "url": "https://www.suse.com/security/cve/CVE-2021-3744/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-3753 page", "url": "https://www.suse.com/security/cve/CVE-2021-3753/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-37576 page", "url": "https://www.suse.com/security/cve/CVE-2021-37576/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-3759 page", "url": "https://www.suse.com/security/cve/CVE-2021-3759/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-38166 page", "url": "https://www.suse.com/security/cve/CVE-2021-38166/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-43976 page", "url": "https://www.suse.com/security/cve/CVE-2021-43976/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-0185 page", "url": "https://www.suse.com/security/cve/CVE-2022-0185/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-0330 page", "url": "https://www.suse.com/security/cve/CVE-2022-0330/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-0847 page", "url": "https://www.suse.com/security/cve/CVE-2022-0847/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-0886 page", "url": "https://www.suse.com/security/cve/CVE-2022-0886/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-1462 page", "url": "https://www.suse.com/security/cve/CVE-2022-1462/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-1516 page", "url": "https://www.suse.com/security/cve/CVE-2022-1516/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-1679 page", "url": "https://www.suse.com/security/cve/CVE-2022-1679/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-1729 page", "url": "https://www.suse.com/security/cve/CVE-2022-1729/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-1852 page", "url": "https://www.suse.com/security/cve/CVE-2022-1852/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-1966 page", "url": "https://www.suse.com/security/cve/CVE-2022-1966/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-1972 page", "url": "https://www.suse.com/security/cve/CVE-2022-1972/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-1973 page", "url": "https://www.suse.com/security/cve/CVE-2022-1973/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-22942 page", "url": "https://www.suse.com/security/cve/CVE-2022-22942/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-2308 page", "url": "https://www.suse.com/security/cve/CVE-2022-2308/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-24958 page", "url": "https://www.suse.com/security/cve/CVE-2022-24958/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-2588 page", "url": "https://www.suse.com/security/cve/CVE-2022-2588/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-2590 page", "url": "https://www.suse.com/security/cve/CVE-2022-2590/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-26490 page", "url": "https://www.suse.com/security/cve/CVE-2022-26490/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-28388 page", "url": "https://www.suse.com/security/cve/CVE-2022-28388/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-28389 page", "url": "https://www.suse.com/security/cve/CVE-2022-28389/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-28390 page", "url": "https://www.suse.com/security/cve/CVE-2022-28390/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-28893 page", "url": "https://www.suse.com/security/cve/CVE-2022-28893/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-29900 page", "url": "https://www.suse.com/security/cve/CVE-2022-29900/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-29901 page", "url": "https://www.suse.com/security/cve/CVE-2022-29901/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-29968 page", "url": "https://www.suse.com/security/cve/CVE-2022-29968/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-3424 page", "url": "https://www.suse.com/security/cve/CVE-2022-3424/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-34918 page", "url": "https://www.suse.com/security/cve/CVE-2022-34918/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-3628 page", "url": "https://www.suse.com/security/cve/CVE-2022-3628/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-3640 page", "url": "https://www.suse.com/security/cve/CVE-2022-3640/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-40982 page", "url": "https://www.suse.com/security/cve/CVE-2022-40982/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-41218 page", "url": "https://www.suse.com/security/cve/CVE-2022-41218/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-41674 page", "url": "https://www.suse.com/security/cve/CVE-2022-41674/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-42719 page", "url": "https://www.suse.com/security/cve/CVE-2022-42719/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-42720 page", "url": "https://www.suse.com/security/cve/CVE-2022-42720/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-42721 page", "url": "https://www.suse.com/security/cve/CVE-2022-42721/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-42722 page", "url": "https://www.suse.com/security/cve/CVE-2022-42722/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-4379 page", "url": "https://www.suse.com/security/cve/CVE-2022-4379/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-44032 page", "url": "https://www.suse.com/security/cve/CVE-2022-44032/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-44033 page", "url": "https://www.suse.com/security/cve/CVE-2022-44033/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-44034 page", "url": "https://www.suse.com/security/cve/CVE-2022-44034/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-45884 page", "url": "https://www.suse.com/security/cve/CVE-2022-45884/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-45885 page", "url": "https://www.suse.com/security/cve/CVE-2022-45885/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-45886 page", "url": "https://www.suse.com/security/cve/CVE-2022-45886/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-45887 page", "url": "https://www.suse.com/security/cve/CVE-2022-45887/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-45888 page", "url": "https://www.suse.com/security/cve/CVE-2022-45888/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-45919 page", "url": "https://www.suse.com/security/cve/CVE-2022-45919/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-45934 page", "url": "https://www.suse.com/security/cve/CVE-2022-45934/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-0045 page", "url": "https://www.suse.com/security/cve/CVE-2023-0045/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-1076 page", "url": "https://www.suse.com/security/cve/CVE-2023-1076/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-1078 page", "url": "https://www.suse.com/security/cve/CVE-2023-1078/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-1192 page", "url": "https://www.suse.com/security/cve/CVE-2023-1192/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-1380 page", "url": "https://www.suse.com/security/cve/CVE-2023-1380/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-20569 page", "url": "https://www.suse.com/security/cve/CVE-2023-20569/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-20593 page", "url": "https://www.suse.com/security/cve/CVE-2023-20593/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-2124 page", "url": "https://www.suse.com/security/cve/CVE-2023-2124/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-31084 page", "url": "https://www.suse.com/security/cve/CVE-2023-31084/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-3141 page", "url": "https://www.suse.com/security/cve/CVE-2023-3141/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-3269 page", "url": "https://www.suse.com/security/cve/CVE-2023-3269/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-39192 page", "url": "https://www.suse.com/security/cve/CVE-2023-39192/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-39193 page", "url": "https://www.suse.com/security/cve/CVE-2023-39193/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-4128 page", "url": "https://www.suse.com/security/cve/CVE-2023-4128/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-4134 page", "url": "https://www.suse.com/security/cve/CVE-2023-4134/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-4194 page", "url": "https://www.suse.com/security/cve/CVE-2023-4194/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-42753 page", "url": "https://www.suse.com/security/cve/CVE-2023-42753/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-42754 page", "url": "https://www.suse.com/security/cve/CVE-2023-42754/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-42756 page", "url": "https://www.suse.com/security/cve/CVE-2023-42756/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-4623 page", "url": "https://www.suse.com/security/cve/CVE-2023-4623/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-46813 page", "url": "https://www.suse.com/security/cve/CVE-2023-46813/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-4881 page", "url": "https://www.suse.com/security/cve/CVE-2023-4881/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-5345 page", "url": "https://www.suse.com/security/cve/CVE-2023-5345/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-6606 page", "url": "https://www.suse.com/security/cve/CVE-2023-6606/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-6610 page", "url": "https://www.suse.com/security/cve/CVE-2023-6610/" } ], "title": "kernel-devel-longterm-6.6.17-1.1 on GA media", "tracking": { "current_release_date": "2024-06-15T00:00:00Z", "generator": { "date": "2024-06-15T00:00:00Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "openSUSE-SU-2024:13704-1", "initial_release_date": "2024-06-15T00:00:00Z", "revision_history": [ { "date": "2024-06-15T00:00:00Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kernel-devel-longterm-6.6.17-1.1.aarch64", "product": { "name": "kernel-devel-longterm-6.6.17-1.1.aarch64", "product_id": "kernel-devel-longterm-6.6.17-1.1.aarch64" } }, { "category": "product_version", "name": "kernel-source-longterm-6.6.17-1.1.aarch64", "product": { "name": "kernel-source-longterm-6.6.17-1.1.aarch64", "product_id": "kernel-source-longterm-6.6.17-1.1.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "kernel-devel-longterm-6.6.17-1.1.ppc64le", "product": { "name": "kernel-devel-longterm-6.6.17-1.1.ppc64le", "product_id": "kernel-devel-longterm-6.6.17-1.1.ppc64le" } }, { "category": "product_version", "name": "kernel-source-longterm-6.6.17-1.1.ppc64le", "product": { "name": "kernel-source-longterm-6.6.17-1.1.ppc64le", "product_id": "kernel-source-longterm-6.6.17-1.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "kernel-devel-longterm-6.6.17-1.1.s390x", "product": { "name": "kernel-devel-longterm-6.6.17-1.1.s390x", "product_id": "kernel-devel-longterm-6.6.17-1.1.s390x" } }, { "category": "product_version", "name": "kernel-source-longterm-6.6.17-1.1.s390x", "product": { "name": "kernel-source-longterm-6.6.17-1.1.s390x", "product_id": "kernel-source-longterm-6.6.17-1.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "kernel-devel-longterm-6.6.17-1.1.x86_64", "product": { "name": "kernel-devel-longterm-6.6.17-1.1.x86_64", "product_id": "kernel-devel-longterm-6.6.17-1.1.x86_64" } }, { "category": "product_version", "name": "kernel-source-longterm-6.6.17-1.1.x86_64", "product": { "name": "kernel-source-longterm-6.6.17-1.1.x86_64", "product_id": "kernel-source-longterm-6.6.17-1.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "openSUSE Tumbleweed", "product": { "name": "openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed", "product_identification_helper": { "cpe": "cpe:/o:opensuse:tumbleweed" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-longterm-6.6.17-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64" }, "product_reference": "kernel-devel-longterm-6.6.17-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-longterm-6.6.17-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le" }, "product_reference": "kernel-devel-longterm-6.6.17-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-longterm-6.6.17-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x" }, "product_reference": "kernel-devel-longterm-6.6.17-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-longterm-6.6.17-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64" }, "product_reference": "kernel-devel-longterm-6.6.17-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-longterm-6.6.17-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64" }, "product_reference": "kernel-source-longterm-6.6.17-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-longterm-6.6.17-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le" }, "product_reference": "kernel-source-longterm-6.6.17-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-longterm-6.6.17-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x" }, "product_reference": "kernel-source-longterm-6.6.17-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-longterm-6.6.17-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" }, "product_reference": "kernel-source-longterm-6.6.17-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" } ] }, "vulnerabilities": [ { "cve": "CVE-2016-3695", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-3695" } ], "notes": [ { "category": "general", "text": "The einj_error_inject function in drivers/acpi/apei/einj.c in the Linux kernel allows local users to simulate hardware errors and consequently cause a denial of service by leveraging failure to disable APEI error injection through EINJ when securelevel is set.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-3695", "url": "https://www.suse.com/security/cve/CVE-2016-3695" }, { "category": "external", "summary": "SUSE Bug 1023051 for CVE-2016-3695", "url": "https://bugzilla.suse.com/1023051" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 2.2, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "low" } ], "title": "CVE-2016-3695" }, { "cve": "CVE-2017-1000251", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-1000251" } ], "notes": [ { "category": "general", "text": "The native Bluetooth stack in the Linux Kernel (BlueZ), starting at the Linux kernel version 2.6.32 and up to and including 4.13.1, are vulnerable to a stack overflow vulnerability in the processing of L2CAP configuration responses resulting in Remote code execution in kernel space.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-1000251", "url": "https://www.suse.com/security/cve/CVE-2017-1000251" }, { "category": "external", "summary": "SUSE Bug 1057389 for CVE-2017-1000251", "url": "https://bugzilla.suse.com/1057389" }, { "category": "external", "summary": "SUSE Bug 1057950 for CVE-2017-1000251", "url": "https://bugzilla.suse.com/1057950" }, { "category": "external", "summary": "SUSE Bug 1070535 for CVE-2017-1000251", "url": "https://bugzilla.suse.com/1070535" }, { "category": "external", "summary": "SUSE Bug 1072117 for CVE-2017-1000251", "url": "https://bugzilla.suse.com/1072117" }, { "category": "external", "summary": "SUSE Bug 1072162 for CVE-2017-1000251", "url": "https://bugzilla.suse.com/1072162" }, { "category": "external", "summary": "SUSE Bug 1120758 for CVE-2017-1000251", "url": "https://bugzilla.suse.com/1120758" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2017-1000251" }, { "cve": "CVE-2017-12153", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-12153" } ], "notes": [ { "category": "general", "text": "A security flaw was discovered in the nl80211_set_rekey_data() function in net/wireless/nl80211.c in the Linux kernel through 4.13.3. This function does not check whether the required attributes are present in a Netlink request. This request can be issued by a user with the CAP_NET_ADMIN capability and may result in a NULL pointer dereference and system crash.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-12153", "url": "https://www.suse.com/security/cve/CVE-2017-12153" }, { "category": "external", "summary": "SUSE Bug 1058410 for CVE-2017-12153", "url": "https://bugzilla.suse.com/1058410" }, { "category": "external", "summary": "SUSE Bug 1058624 for CVE-2017-12153", "url": "https://bugzilla.suse.com/1058624" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2017-12153" }, { "cve": "CVE-2017-13080", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-13080" } ], "notes": [ { "category": "general", "text": "Wi-Fi Protected Access (WPA and WPA2) allows reinstallation of the Group Temporal Key (GTK) during the group key handshake, allowing an attacker within radio range to replay frames from access points to clients.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-13080", "url": "https://www.suse.com/security/cve/CVE-2017-13080" }, { "category": "external", "summary": "SUSE Bug 1056061 for CVE-2017-13080", "url": "https://bugzilla.suse.com/1056061" }, { "category": "external", "summary": "SUSE Bug 1063479 for CVE-2017-13080", "url": "https://bugzilla.suse.com/1063479" }, { "category": "external", "summary": "SUSE Bug 1063667 for CVE-2017-13080", "url": "https://bugzilla.suse.com/1063667" }, { "category": "external", "summary": "SUSE Bug 1063671 for CVE-2017-13080", "url": "https://bugzilla.suse.com/1063671" }, { "category": "external", "summary": "SUSE Bug 1066295 for CVE-2017-13080", "url": "https://bugzilla.suse.com/1066295" }, { "category": "external", "summary": "SUSE Bug 1105108 for CVE-2017-13080", "url": "https://bugzilla.suse.com/1105108" }, { "category": "external", "summary": "SUSE Bug 1178872 for CVE-2017-13080", "url": "https://bugzilla.suse.com/1178872" }, { "category": "external", "summary": "SUSE Bug 1179588 for CVE-2017-13080", "url": "https://bugzilla.suse.com/1179588" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2017-13080" }, { "cve": "CVE-2017-14051", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-14051" } ], "notes": [ { "category": "general", "text": "An integer overflow in the qla2x00_sysfs_write_optrom_ctl function in drivers/scsi/qla2xxx/qla_attr.c in the Linux kernel through 4.12.10 allows local users to cause a denial of service (memory corruption and system crash) by leveraging root access.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-14051", "url": "https://www.suse.com/security/cve/CVE-2017-14051" }, { "category": "external", "summary": "SUSE Bug 1056588 for CVE-2017-14051", "url": "https://bugzilla.suse.com/1056588" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2017-14051" }, { "cve": "CVE-2017-15129", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-15129" } ], "notes": [ { "category": "general", "text": "A use-after-free vulnerability was found in network namespaces code affecting the Linux kernel before 4.14.11. The function get_net_ns_by_id() in net/core/net_namespace.c does not check for the net::count value after it has found a peer network in netns_ids idr, which could lead to double free and memory corruption. This vulnerability could allow an unprivileged local user to induce kernel memory corruption on the system, leading to a crash. Due to the nature of the flaw, privilege escalation cannot be fully ruled out, although it is thought to be unlikely.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-15129", "url": "https://www.suse.com/security/cve/CVE-2017-15129" }, { "category": "external", "summary": "SUSE Bug 1074839 for CVE-2017-15129", "url": "https://bugzilla.suse.com/1074839" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2017-15129" }, { "cve": "CVE-2017-15265", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-15265" } ], "notes": [ { "category": "general", "text": "Race condition in the ALSA subsystem in the Linux kernel before 4.13.8 allows local users to cause a denial of service (use-after-free) or possibly have unspecified other impact via crafted /dev/snd/seq ioctl calls, related to sound/core/seq/seq_clientmgr.c and sound/core/seq/seq_ports.c.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-15265", "url": "https://www.suse.com/security/cve/CVE-2017-15265" }, { "category": "external", "summary": "SUSE Bug 1062520 for CVE-2017-15265", "url": "https://bugzilla.suse.com/1062520" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2017-15265", "url": "https://bugzilla.suse.com/1115893" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2017-15265" }, { "cve": "CVE-2017-16536", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-16536" } ], "notes": [ { "category": "general", "text": "The cx231xx_usb_probe function in drivers/media/usb/cx231xx/cx231xx-cards.c in the Linux kernel through 4.13.11 allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact via a crafted USB device.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-16536", "url": "https://www.suse.com/security/cve/CVE-2017-16536" }, { "category": "external", "summary": "SUSE Bug 1066606 for CVE-2017-16536", "url": "https://bugzilla.suse.com/1066606" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2017-16536", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1146519 for CVE-2017-16536", "url": "https://bugzilla.suse.com/1146519" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2017-16536" }, { "cve": "CVE-2017-16537", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-16537" } ], "notes": [ { "category": "general", "text": "The imon_probe function in drivers/media/rc/imon.c in the Linux kernel through 4.13.11 allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact via a crafted USB device.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-16537", "url": "https://www.suse.com/security/cve/CVE-2017-16537" }, { "category": "external", "summary": "SUSE Bug 1066573 for CVE-2017-16537", "url": "https://bugzilla.suse.com/1066573" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2017-16537", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1146519 for CVE-2017-16537", "url": "https://bugzilla.suse.com/1146519" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2017-16537" }, { "cve": "CVE-2017-16645", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-16645" } ], "notes": [ { "category": "general", "text": "The ims_pcu_get_cdc_union_desc function in drivers/input/misc/ims-pcu.c in the Linux kernel through 4.13.11 allows local users to cause a denial of service (ims_pcu_parse_cdc_data out-of-bounds read and system crash) or possibly have unspecified other impact via a crafted USB device.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-16645", "url": "https://www.suse.com/security/cve/CVE-2017-16645" }, { "category": "external", "summary": "SUSE Bug 1067132 for CVE-2017-16645", "url": "https://bugzilla.suse.com/1067132" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2017-16645", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1146519 for CVE-2017-16645", "url": "https://bugzilla.suse.com/1146519" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2017-16645" }, { "cve": "CVE-2017-16646", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-16646" } ], "notes": [ { "category": "general", "text": "drivers/media/usb/dvb-usb/dib0700_devices.c in the Linux kernel through 4.13.11 allows local users to cause a denial of service (BUG and system crash) or possibly have unspecified other impact via a crafted USB device.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-16646", "url": "https://www.suse.com/security/cve/CVE-2017-16646" }, { "category": "external", "summary": "SUSE Bug 1067105 for CVE-2017-16646", "url": "https://bugzilla.suse.com/1067105" }, { "category": "external", "summary": "SUSE Bug 1146519 for CVE-2017-16646", "url": "https://bugzilla.suse.com/1146519" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2017-16646" }, { "cve": "CVE-2017-16647", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-16647" } ], "notes": [ { "category": "general", "text": "drivers/net/usb/asix_devices.c in the Linux kernel through 4.13.11 allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact via a crafted USB device.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-16647", "url": "https://www.suse.com/security/cve/CVE-2017-16647" }, { "category": "external", "summary": "SUSE Bug 1067102 for CVE-2017-16647", "url": "https://bugzilla.suse.com/1067102" }, { "category": "external", "summary": "SUSE Bug 1146519 for CVE-2017-16647", "url": "https://bugzilla.suse.com/1146519" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2017-16647" }, { "cve": "CVE-2017-16648", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-16648" } ], "notes": [ { "category": "general", "text": "The dvb_frontend_free function in drivers/media/dvb-core/dvb_frontend.c in the Linux kernel through 4.13.11 allows local users to cause a denial of service (use-after-free and system crash) or possibly have unspecified other impact via a crafted USB device. NOTE: the function was later renamed __dvb_frontend_free.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-16648", "url": "https://www.suse.com/security/cve/CVE-2017-16648" }, { "category": "external", "summary": "SUSE Bug 1067087 for CVE-2017-16648", "url": "https://bugzilla.suse.com/1067087" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2017-16648", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1146519 for CVE-2017-16648", "url": "https://bugzilla.suse.com/1146519" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2017-16648" }, { "cve": "CVE-2017-16995", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-16995" } ], "notes": [ { "category": "general", "text": "The check_alu_op function in kernel/bpf/verifier.c in the Linux kernel through 4.4 allows local users to cause a denial of service (memory corruption) or possibly have unspecified other impact by leveraging incorrect sign extension.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-16995", "url": "https://www.suse.com/security/cve/CVE-2017-16995" }, { "category": "external", "summary": "SUSE Bug 1073928 for CVE-2017-16995", "url": "https://bugzilla.suse.com/1073928" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2017-16995" }, { "cve": "CVE-2017-16996", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-16996" } ], "notes": [ { "category": "general", "text": "kernel/bpf/verifier.c in the Linux kernel through 4.14.8 allows local users to cause a denial of service (memory corruption) or possibly have unspecified other impact by leveraging register truncation mishandling.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-16996", "url": "https://www.suse.com/security/cve/CVE-2017-16996" }, { "category": "external", "summary": "SUSE Bug 1073928 for CVE-2017-16996", "url": "https://bugzilla.suse.com/1073928" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2017-16996" }, { "cve": "CVE-2017-17448", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-17448" } ], "notes": [ { "category": "general", "text": "net/netfilter/nfnetlink_cthelper.c in the Linux kernel through 4.14.4 does not require the CAP_NET_ADMIN capability for new, get, and del operations, which allows local users to bypass intended access restrictions because the nfnl_cthelper_list data structure is shared across all net namespaces.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-17448", "url": "https://www.suse.com/security/cve/CVE-2017-17448" }, { "category": "external", "summary": "SUSE Bug 1071693 for CVE-2017-17448", "url": "https://bugzilla.suse.com/1071693" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:L", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2017-17448" }, { "cve": "CVE-2017-17449", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-17449" } ], "notes": [ { "category": "general", "text": "The __netlink_deliver_tap_skb function in net/netlink/af_netlink.c in the Linux kernel through 4.14.4, when CONFIG_NLMON is enabled, does not restrict observations of Netlink messages to a single net namespace, which allows local users to obtain sensitive information by leveraging the CAP_NET_ADMIN capability to sniff an nlmon interface for all Netlink activity on the system.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-17449", "url": "https://www.suse.com/security/cve/CVE-2017-17449" }, { "category": "external", "summary": "SUSE Bug 1071694 for CVE-2017-17449", "url": "https://bugzilla.suse.com/1071694" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2017-17449" }, { "cve": "CVE-2017-17450", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-17450" } ], "notes": [ { "category": "general", "text": "net/netfilter/xt_osf.c in the Linux kernel through 4.14.4 does not require the CAP_NET_ADMIN capability for add_callback and remove_callback operations, which allows local users to bypass intended access restrictions because the xt_osf_fingers data structure is shared across all net namespaces.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-17450", "url": "https://www.suse.com/security/cve/CVE-2017-17450" }, { "category": "external", "summary": "SUSE Bug 1071695 for CVE-2017-17450", "url": "https://bugzilla.suse.com/1071695" }, { "category": "external", "summary": "SUSE Bug 1074033 for CVE-2017-17450", "url": "https://bugzilla.suse.com/1074033" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2017-17450", "url": "https://bugzilla.suse.com/1115893" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2017-17450" }, { "cve": "CVE-2017-17852", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-17852" } ], "notes": [ { "category": "general", "text": "kernel/bpf/verifier.c in the Linux kernel through 4.14.8 allows local users to cause a denial of service (memory corruption) or possibly have unspecified other impact by leveraging mishandling of 32-bit ALU ops.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-17852", "url": "https://www.suse.com/security/cve/CVE-2017-17852" }, { "category": "external", "summary": "SUSE Bug 1073928 for CVE-2017-17852", "url": "https://bugzilla.suse.com/1073928" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2017-17852" }, { "cve": "CVE-2017-17853", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-17853" } ], "notes": [ { "category": "general", "text": "kernel/bpf/verifier.c in the Linux kernel through 4.14.8 allows local users to cause a denial of service (memory corruption) or possibly have unspecified other impact by leveraging incorrect BPF_RSH signed bounds calculations.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-17853", "url": "https://www.suse.com/security/cve/CVE-2017-17853" }, { "category": "external", "summary": "SUSE Bug 1073928 for CVE-2017-17853", "url": "https://bugzilla.suse.com/1073928" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2017-17853" }, { "cve": "CVE-2017-17854", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-17854" } ], "notes": [ { "category": "general", "text": "kernel/bpf/verifier.c in the Linux kernel through 4.14.8 allows local users to cause a denial of service (integer overflow and memory corruption) or possibly have unspecified other impact by leveraging unrestricted integer values for pointer arithmetic.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-17854", "url": "https://www.suse.com/security/cve/CVE-2017-17854" }, { "category": "external", "summary": "SUSE Bug 1073928 for CVE-2017-17854", "url": "https://bugzilla.suse.com/1073928" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2017-17854" }, { "cve": "CVE-2017-17855", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-17855" } ], "notes": [ { "category": "general", "text": "kernel/bpf/verifier.c in the Linux kernel through 4.14.8 allows local users to cause a denial of service (memory corruption) or possibly have unspecified other impact by leveraging improper use of pointers in place of scalars.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-17855", "url": "https://www.suse.com/security/cve/CVE-2017-17855" }, { "category": "external", "summary": "SUSE Bug 1073928 for CVE-2017-17855", "url": "https://bugzilla.suse.com/1073928" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2017-17855" }, { "cve": "CVE-2017-17856", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-17856" } ], "notes": [ { "category": "general", "text": "kernel/bpf/verifier.c in the Linux kernel through 4.14.8 allows local users to cause a denial of service (memory corruption) or possibly have unspecified other impact by leveraging the lack of stack-pointer alignment enforcement.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-17856", "url": "https://www.suse.com/security/cve/CVE-2017-17856" }, { "category": "external", "summary": "SUSE Bug 1073928 for CVE-2017-17856", "url": "https://bugzilla.suse.com/1073928" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2017-17856" }, { "cve": "CVE-2017-17857", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-17857" } ], "notes": [ { "category": "general", "text": "The check_stack_boundary function in kernel/bpf/verifier.c in the Linux kernel through 4.14.8 allows local users to cause a denial of service (memory corruption) or possibly have unspecified other impact by leveraging mishandling of invalid variable stack read operations.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-17857", "url": "https://www.suse.com/security/cve/CVE-2017-17857" }, { "category": "external", "summary": "SUSE Bug 1073928 for CVE-2017-17857", "url": "https://bugzilla.suse.com/1073928" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2017-17857" }, { "cve": "CVE-2017-17862", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-17862" } ], "notes": [ { "category": "general", "text": "kernel/bpf/verifier.c in the Linux kernel through 4.14.8 ignores unreachable code, even though it would still be processed by JIT compilers. This behavior, also considered an improper branch-pruning logic issue, could possibly be used by local users for denial of service.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-17862", "url": "https://www.suse.com/security/cve/CVE-2017-17862" }, { "category": "external", "summary": "SUSE Bug 1073928 for CVE-2017-17862", "url": "https://bugzilla.suse.com/1073928" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2017-17862" }, { "cve": "CVE-2017-5123", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-5123" } ], "notes": [ { "category": "general", "text": "Insufficient data validation in waitid allowed an user to escape sandboxes on Linux.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-5123", "url": "https://www.suse.com/security/cve/CVE-2017-5123" }, { "category": "external", "summary": "SUSE Bug 1062473 for CVE-2017-5123", "url": "https://bugzilla.suse.com/1062473" }, { "category": "external", "summary": "SUSE Bug 1122971 for CVE-2017-5123", "url": "https://bugzilla.suse.com/1122971" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2017-5123" }, { "cve": "CVE-2017-5715", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-5715" } ], "notes": [ { "category": "general", "text": "Systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-5715", "url": "https://www.suse.com/security/cve/CVE-2017-5715" }, { "category": "external", "summary": "SUSE Bug 1068032 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1068032" }, { "category": "external", "summary": "SUSE Bug 1074562 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1074562" }, { "category": "external", "summary": "SUSE Bug 1074578 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1074578" }, { "category": "external", "summary": "SUSE Bug 1074701 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1074701" }, { "category": "external", "summary": "SUSE Bug 1074741 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1074741" }, { "category": "external", "summary": "SUSE Bug 1074919 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1074919" }, { "category": "external", "summary": "SUSE Bug 1075006 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1075006" }, { "category": "external", "summary": "SUSE Bug 1075007 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1075007" }, { "category": "external", "summary": "SUSE Bug 1075262 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1075262" }, { "category": "external", "summary": "SUSE Bug 1075419 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1075419" }, { "category": "external", "summary": "SUSE Bug 1076115 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1076115" }, { "category": "external", "summary": "SUSE Bug 1076372 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1076372" }, { "category": "external", "summary": "SUSE Bug 1076606 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1076606" }, { "category": "external", "summary": "SUSE Bug 1078353 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1078353" }, { "category": "external", "summary": "SUSE Bug 1080039 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1080039" }, { "category": "external", "summary": "SUSE Bug 1087887 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1087887" }, { "category": "external", "summary": "SUSE Bug 1087939 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1087939" }, { "category": "external", "summary": "SUSE Bug 1088147 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1088147" }, { "category": "external", "summary": "SUSE Bug 1089055 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1089055" }, { "category": "external", "summary": "SUSE Bug 1091815 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1091815" }, { "category": "external", "summary": "SUSE Bug 1095735 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1095735" }, { "category": "external", "summary": "SUSE Bug 1102517 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1102517" }, { "category": "external", "summary": "SUSE Bug 1105108 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1105108" }, { "category": "external", "summary": "SUSE Bug 1126516 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1126516" }, { "category": "external", "summary": "SUSE Bug 1173489 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1173489" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1178658" }, { "category": "external", "summary": "SUSE Bug 1201457 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1201457" }, { "category": "external", "summary": "SUSE Bug 1201877 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1201877" }, { "category": "external", "summary": "SUSE Bug 1203236 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1203236" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2017-5715" }, { "cve": "CVE-2017-5753", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-5753" } ], "notes": [ { "category": "general", "text": "Systems with microprocessors utilizing speculative execution and branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-5753", "url": "https://www.suse.com/security/cve/CVE-2017-5753" }, { "category": "external", "summary": "SUSE Bug 1068032 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1068032" }, { "category": "external", "summary": "SUSE Bug 1074562 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1074562" }, { "category": "external", "summary": "SUSE Bug 1074578 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1074578" }, { "category": "external", "summary": "SUSE Bug 1074701 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1074701" }, { "category": "external", "summary": "SUSE Bug 1075006 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1075006" }, { "category": "external", "summary": "SUSE Bug 1075419 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1075419" }, { "category": "external", "summary": "SUSE Bug 1075748 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1075748" }, { "category": "external", "summary": "SUSE Bug 1080039 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1080039" }, { "category": "external", "summary": "SUSE Bug 1087084 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1087084" }, { "category": "external", "summary": "SUSE Bug 1087939 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1087939" }, { "category": "external", "summary": "SUSE Bug 1089055 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1089055" }, { "category": "external", "summary": "SUSE Bug 1136865 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1136865" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1178658" }, { "category": "external", "summary": "SUSE Bug 1201877 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1201877" }, { "category": "external", "summary": "SUSE Bug 1209547 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1209547" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2017-5753" }, { "cve": "CVE-2017-5754", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-5754" } ], "notes": [ { "category": "general", "text": "Systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis of the data cache.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-5754", "url": "https://www.suse.com/security/cve/CVE-2017-5754" }, { "category": "external", "summary": "SUSE Bug 1068032 for CVE-2017-5754", "url": "https://bugzilla.suse.com/1068032" }, { "category": "external", "summary": "SUSE Bug 1074562 for CVE-2017-5754", "url": "https://bugzilla.suse.com/1074562" }, { "category": "external", "summary": "SUSE Bug 1074578 for CVE-2017-5754", "url": "https://bugzilla.suse.com/1074578" }, { "category": "external", "summary": "SUSE Bug 1074701 for CVE-2017-5754", "url": "https://bugzilla.suse.com/1074701" }, { "category": "external", "summary": "SUSE Bug 1075006 for CVE-2017-5754", "url": "https://bugzilla.suse.com/1075006" }, { "category": "external", "summary": "SUSE Bug 1075008 for CVE-2017-5754", "url": "https://bugzilla.suse.com/1075008" }, { "category": "external", "summary": "SUSE Bug 1087939 for CVE-2017-5754", "url": "https://bugzilla.suse.com/1087939" }, { "category": "external", "summary": "SUSE Bug 1089055 for CVE-2017-5754", "url": "https://bugzilla.suse.com/1089055" }, { "category": "external", "summary": "SUSE Bug 1115045 for CVE-2017-5754", "url": "https://bugzilla.suse.com/1115045" }, { "category": "external", "summary": "SUSE Bug 1136865 for CVE-2017-5754", "url": "https://bugzilla.suse.com/1136865" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2017-5754", "url": "https://bugzilla.suse.com/1178658" }, { "category": "external", "summary": "SUSE Bug 1201877 for CVE-2017-5754", "url": "https://bugzilla.suse.com/1201877" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2017-5754" }, { "cve": "CVE-2017-7541", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-7541" } ], "notes": [ { "category": "general", "text": "The brcmf_cfg80211_mgmt_tx function in drivers/net/wireless/broadcom/brcm80211/brcmfmac/cfg80211.c in the Linux kernel before 4.12.3 allows local users to cause a denial of service (buffer overflow and system crash) or possibly gain privileges via a crafted NL80211_CMD_FRAME Netlink packet.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-7541", "url": "https://www.suse.com/security/cve/CVE-2017-7541" }, { "category": "external", "summary": "SUSE Bug 1049645 for CVE-2017-7541", "url": "https://bugzilla.suse.com/1049645" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2017-7541" }, { "cve": "CVE-2017-7542", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-7542" } ], "notes": [ { "category": "general", "text": "The ip6_find_1stfragopt function in net/ipv6/output_core.c in the Linux kernel through 4.12.3 allows local users to cause a denial of service (integer overflow and infinite loop) by leveraging the ability to open a raw socket.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-7542", "url": "https://www.suse.com/security/cve/CVE-2017-7542" }, { "category": "external", "summary": "SUSE Bug 1049882 for CVE-2017-7542", "url": "https://bugzilla.suse.com/1049882" }, { "category": "external", "summary": "SUSE Bug 1061936 for CVE-2017-7542", "url": "https://bugzilla.suse.com/1061936" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2017-7542" }, { "cve": "CVE-2017-8824", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-8824" } ], "notes": [ { "category": "general", "text": "The dccp_disconnect function in net/dccp/proto.c in the Linux kernel through 4.14.3 allows local users to gain privileges or cause a denial of service (use-after-free) via an AF_UNSPEC connect system call during the DCCP_LISTEN state.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-8824", "url": "https://www.suse.com/security/cve/CVE-2017-8824" }, { "category": "external", "summary": "SUSE Bug 1070771 for CVE-2017-8824", "url": "https://bugzilla.suse.com/1070771" }, { "category": "external", "summary": "SUSE Bug 1076734 for CVE-2017-8824", "url": "https://bugzilla.suse.com/1076734" }, { "category": "external", "summary": "SUSE Bug 1092904 for CVE-2017-8824", "url": "https://bugzilla.suse.com/1092904" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2017-8824", "url": "https://bugzilla.suse.com/1115893" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2017-8824" }, { "cve": "CVE-2017-8831", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-8831" } ], "notes": [ { "category": "general", "text": "The saa7164_bus_get function in drivers/media/pci/saa7164/saa7164-bus.c in the Linux kernel through 4.11.5 allows local users to cause a denial of service (out-of-bounds array access) or possibly have unspecified other impact by changing a certain sequence-number value, aka a \"double fetch\" vulnerability.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-8831", "url": "https://www.suse.com/security/cve/CVE-2017-8831" }, { "category": "external", "summary": "SUSE Bug 1037994 for CVE-2017-8831", "url": "https://bugzilla.suse.com/1037994" }, { "category": "external", "summary": "SUSE Bug 1061936 for CVE-2017-8831", "url": "https://bugzilla.suse.com/1061936" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2017-8831", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2017-8831", "url": "https://bugzilla.suse.com/1115893" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2017-8831" }, { "cve": "CVE-2018-1000004", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-1000004" } ], "notes": [ { "category": "general", "text": "In the Linux kernel 4.12, 3.10, 2.6 and possibly earlier versions a race condition vulnerability exists in the sound system, this can lead to a deadlock and denial of service condition.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-1000004", "url": "https://www.suse.com/security/cve/CVE-2018-1000004" }, { "category": "external", "summary": "SUSE Bug 1076017 for CVE-2018-1000004", "url": "https://bugzilla.suse.com/1076017" }, { "category": "external", "summary": "SUSE Bug 1091815 for CVE-2018-1000004", "url": "https://bugzilla.suse.com/1091815" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2018-1000004" }, { "cve": "CVE-2018-10322", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-10322" } ], "notes": [ { "category": "general", "text": "The xfs_dinode_verify function in fs/xfs/libxfs/xfs_inode_buf.c in the Linux kernel through 4.16.3 allows local users to cause a denial of service (xfs_ilock_attr_map_shared invalid pointer dereference) via a crafted xfs image.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-10322", "url": "https://www.suse.com/security/cve/CVE-2018-10322" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-10322", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1090749 for CVE-2018-10322", "url": "https://bugzilla.suse.com/1090749" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2018-10322" }, { "cve": "CVE-2018-10323", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-10323" } ], "notes": [ { "category": "general", "text": "The xfs_bmap_extents_to_btree function in fs/xfs/libxfs/xfs_bmap.c in the Linux kernel through 4.16.3 allows local users to cause a denial of service (xfs_bmapi_write NULL pointer dereference) via a crafted xfs image.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-10323", "url": "https://www.suse.com/security/cve/CVE-2018-10323" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-10323", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1090717 for CVE-2018-10323", "url": "https://bugzilla.suse.com/1090717" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2018-10323" }, { "cve": "CVE-2018-1068", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-1068" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux 4.x kernel\u0027s implementation of 32-bit syscall interface for bridging. This allowed a privileged user to arbitrarily write to a limited range of kernel memory.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-1068", "url": "https://www.suse.com/security/cve/CVE-2018-1068" }, { "category": "external", "summary": "SUSE Bug 1085107 for CVE-2018-1068", "url": "https://bugzilla.suse.com/1085107" }, { "category": "external", "summary": "SUSE Bug 1085114 for CVE-2018-1068", "url": "https://bugzilla.suse.com/1085114" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-1068", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1123903 for CVE-2018-1068", "url": "https://bugzilla.suse.com/1123903" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2018-1068" }, { "cve": "CVE-2018-1118", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-1118" } ], "notes": [ { "category": "general", "text": "Linux kernel vhost since version 4.8 does not properly initialize memory in messages passed between virtual guests and the host operating system in the vhost/vhost.c:vhost_new_msg() function. This can allow local privileged users to read some kernel memory contents when reading from the /dev/vhost-net device file.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-1118", "url": "https://www.suse.com/security/cve/CVE-2018-1118" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-1118", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1092472 for CVE-2018-1118", "url": "https://bugzilla.suse.com/1092472" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2018-1118" }, { "cve": "CVE-2018-12232", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-12232" } ], "notes": [ { "category": "general", "text": "In net/socket.c in the Linux kernel through 4.17.1, there is a race condition between fchownat and close in cases where they target the same socket file descriptor, related to the sock_close and sockfs_setattr functions. fchownat does not increment the file descriptor reference count, which allows close to set the socket to NULL during fchownat\u0027s execution, leading to a NULL pointer dereference and system crash.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-12232", "url": "https://www.suse.com/security/cve/CVE-2018-12232" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-12232", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1097593 for CVE-2018-12232", "url": "https://bugzilla.suse.com/1097593" }, { "category": "external", "summary": "SUSE Bug 1125907 for CVE-2018-12232", "url": "https://bugzilla.suse.com/1125907" }, { "category": "external", "summary": "SUSE Bug 1127757 for CVE-2018-12232", "url": "https://bugzilla.suse.com/1127757" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2018-12232" }, { "cve": "CVE-2018-12714", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-12714" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel through 4.17.2. The filter parsing in kernel/trace/trace_events_filter.c could be called with no filter, which is an N=0 case when it expected at least one line to have been read, thus making the N-1 index invalid. This allows attackers to cause a denial of service (slab out-of-bounds write) or possibly have unspecified other impact via crafted perf_event_open and mmap system calls.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-12714", "url": "https://www.suse.com/security/cve/CVE-2018-12714" }, { "category": "external", "summary": "SUSE Bug 1098933 for CVE-2018-12714", "url": "https://bugzilla.suse.com/1098933" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2018-12714" }, { "cve": "CVE-2018-13053", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-13053" } ], "notes": [ { "category": "general", "text": "The alarm_timer_nsleep function in kernel/time/alarmtimer.c in the Linux kernel through 4.17.3 has an integer overflow via a large relative timeout because ktime_add_safe is not used.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-13053", "url": "https://www.suse.com/security/cve/CVE-2018-13053" }, { "category": "external", "summary": "SUSE Bug 1099924 for CVE-2018-13053", "url": "https://bugzilla.suse.com/1099924" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2018-13053", "url": "https://bugzilla.suse.com/1115893" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.3, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "low" } ], "title": "CVE-2018-13053" }, { "cve": "CVE-2018-18710", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-18710" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel through 4.19. An information leak in cdrom_ioctl_select_disc in drivers/cdrom/cdrom.c could be used by local attackers to read kernel memory because a cast from unsigned long to int interferes with bounds checking. This is similar to CVE-2018-10940 and CVE-2018-16658.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-18710", "url": "https://www.suse.com/security/cve/CVE-2018-18710" }, { "category": "external", "summary": "SUSE Bug 1113751 for CVE-2018-18710", "url": "https://bugzilla.suse.com/1113751" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2018-18710" }, { "cve": "CVE-2018-19824", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-19824" } ], "notes": [ { "category": "general", "text": "In the Linux kernel through 4.19.6, a local user could exploit a use-after-free in the ALSA driver by supplying a malicious USB Sound device (with zero interfaces) that is mishandled in usb_audio_probe in sound/usb/card.c.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-19824", "url": "https://www.suse.com/security/cve/CVE-2018-19824" }, { "category": "external", "summary": "SUSE Bug 1118152 for CVE-2018-19824", "url": "https://bugzilla.suse.com/1118152" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2018-19824" }, { "cve": "CVE-2018-5332", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-5332" } ], "notes": [ { "category": "general", "text": "In the Linux kernel through 3.2, the rds_message_alloc_sgs() function does not validate a value that is used during DMA page allocation, leading to a heap-based out-of-bounds write (related to the rds_rdma_extra_size function in net/rds/rdma.c).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-5332", "url": "https://www.suse.com/security/cve/CVE-2018-5332" }, { "category": "external", "summary": "SUSE Bug 1075621 for CVE-2018-5332", "url": "https://bugzilla.suse.com/1075621" }, { "category": "external", "summary": "SUSE Bug 1091815 for CVE-2018-5332", "url": "https://bugzilla.suse.com/1091815" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2018-5332", "url": "https://bugzilla.suse.com/1115893" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.6, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:L", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "low" } ], "title": "CVE-2018-5332" }, { "cve": "CVE-2018-5333", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-5333" } ], "notes": [ { "category": "general", "text": "In the Linux kernel through 4.14.13, the rds_cmsg_atomic function in net/rds/rdma.c mishandles cases where page pinning fails or an invalid address is supplied, leading to an rds_atomic_free_op NULL pointer dereference.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-5333", "url": "https://www.suse.com/security/cve/CVE-2018-5333" }, { "category": "external", "summary": "SUSE Bug 1075617 for CVE-2018-5333", "url": "https://bugzilla.suse.com/1075617" }, { "category": "external", "summary": "SUSE Bug 1091815 for CVE-2018-5333", "url": "https://bugzilla.suse.com/1091815" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 2.9, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "low" } ], "title": "CVE-2018-5333" }, { "cve": "CVE-2018-8043", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-8043" } ], "notes": [ { "category": "general", "text": "The unimac_mdio_probe function in drivers/net/phy/mdio-bcm-unimac.c in the Linux kernel through 4.15.8 does not validate certain resource availability, which allows local users to cause a denial of service (NULL pointer dereference).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-8043", "url": "https://www.suse.com/security/cve/CVE-2018-8043" }, { "category": "external", "summary": "SUSE Bug 1084829 for CVE-2018-8043", "url": "https://bugzilla.suse.com/1084829" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 0, "baseSeverity": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "low" } ], "title": "CVE-2018-8043" }, { "cve": "CVE-2018-8087", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-8087" } ], "notes": [ { "category": "general", "text": "Memory leak in the hwsim_new_radio_nl function in drivers/net/wireless/mac80211_hwsim.c in the Linux kernel through 4.15.9 allows local users to cause a denial of service (memory consumption) by triggering an out-of-array error case.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-8087", "url": "https://www.suse.com/security/cve/CVE-2018-8087" }, { "category": "external", "summary": "SUSE Bug 1085053 for CVE-2018-8087", "url": "https://bugzilla.suse.com/1085053" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2018-8087" }, { "cve": "CVE-2018-8822", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-8822" } ], "notes": [ { "category": "general", "text": "Incorrect buffer length handling in the ncp_read_kernel function in fs/ncpfs/ncplib_kernel.c in the Linux kernel through 4.15.11, and in drivers/staging/ncpfs/ncplib_kernel.c in the Linux kernel 4.16-rc through 4.16-rc6, could be exploited by malicious NCPFS servers to crash the kernel or execute code.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-8822", "url": "https://www.suse.com/security/cve/CVE-2018-8822" }, { "category": "external", "summary": "SUSE Bug 1086162 for CVE-2018-8822", "url": "https://bugzilla.suse.com/1086162" }, { "category": "external", "summary": "SUSE Bug 1090404 for CVE-2018-8822", "url": "https://bugzilla.suse.com/1090404" }, { "category": "external", "summary": "SUSE Bug 1091815 for CVE-2018-8822", "url": "https://bugzilla.suse.com/1091815" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2018-8822" }, { "cve": "CVE-2019-10207", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-10207" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel\u0027s Bluetooth implementation of UART, all versions kernel 3.x.x before 4.18.0 and kernel 5.x.x. An attacker with local access and write permissions to the Bluetooth hardware could use this flaw to issue a specially crafted ioctl function call and cause the system to crash.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-10207", "url": "https://www.suse.com/security/cve/CVE-2019-10207" }, { "category": "external", "summary": "SUSE Bug 1123959 for CVE-2019-10207", "url": "https://bugzilla.suse.com/1123959" }, { "category": "external", "summary": "SUSE Bug 1142857 for CVE-2019-10207", "url": "https://bugzilla.suse.com/1142857" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-10207" }, { "cve": "CVE-2019-11477", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-11477" } ], "notes": [ { "category": "general", "text": "Jonathan Looney discovered that the TCP_SKB_CB(skb)-\u003etcp_gso_segs value was subject to an integer overflow in the Linux kernel when handling TCP Selective Acknowledgments (SACKs). A remote attacker could use this to cause a denial of service. This has been fixed in stable kernel releases 4.4.182, 4.9.182, 4.14.127, 4.19.52, 5.1.11, and is fixed in commit 3b4929f65b0d8249f19a50245cd88ed1a2f78cff.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-11477", "url": "https://www.suse.com/security/cve/CVE-2019-11477" }, { "category": "external", "summary": "SUSE Bug 1132686 for CVE-2019-11477", "url": "https://bugzilla.suse.com/1132686" }, { "category": "external", "summary": "SUSE Bug 1137586 for CVE-2019-11477", "url": "https://bugzilla.suse.com/1137586" }, { "category": "external", "summary": "SUSE Bug 1142129 for CVE-2019-11477", "url": "https://bugzilla.suse.com/1142129" }, { "category": "external", "summary": "SUSE Bug 1153242 for CVE-2019-11477", "url": "https://bugzilla.suse.com/1153242" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.2, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2019-11477" }, { "cve": "CVE-2019-11478", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-11478" } ], "notes": [ { "category": "general", "text": "Jonathan Looney discovered that the TCP retransmission queue implementation in tcp_fragment in the Linux kernel could be fragmented when handling certain TCP Selective Acknowledgment (SACK) sequences. A remote attacker could use this to cause a denial of service. This has been fixed in stable kernel releases 4.4.182, 4.9.182, 4.14.127, 4.19.52, 5.1.11, and is fixed in commit f070ef2ac66716357066b683fb0baf55f8191a2e.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-11478", "url": "https://www.suse.com/security/cve/CVE-2019-11478" }, { "category": "external", "summary": "SUSE Bug 1132686 for CVE-2019-11478", "url": "https://bugzilla.suse.com/1132686" }, { "category": "external", "summary": "SUSE Bug 1137586 for CVE-2019-11478", "url": "https://bugzilla.suse.com/1137586" }, { "category": "external", "summary": "SUSE Bug 1142129 for CVE-2019-11478", "url": "https://bugzilla.suse.com/1142129" }, { "category": "external", "summary": "SUSE Bug 1143542 for CVE-2019-11478", "url": "https://bugzilla.suse.com/1143542" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2019-11478" }, { "cve": "CVE-2019-11479", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-11479" } ], "notes": [ { "category": "general", "text": "Jonathan Looney discovered that the Linux kernel default MSS is hard-coded to 48 bytes. This allows a remote peer to fragment TCP resend queues significantly more than if a larger MSS were enforced. A remote attacker could use this to cause a denial of service. This has been fixed in stable kernel releases 4.4.182, 4.9.182, 4.14.127, 4.19.52, 5.1.11, and is fixed in commits 967c05aee439e6e5d7d805e195b3a20ef5c433d6 and 5f3e2bf008c2221478101ee72f5cb4654b9fc363.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-11479", "url": "https://www.suse.com/security/cve/CVE-2019-11479" }, { "category": "external", "summary": "SUSE Bug 1132686 for CVE-2019-11479", "url": "https://bugzilla.suse.com/1132686" }, { "category": "external", "summary": "SUSE Bug 1137586 for CVE-2019-11479", "url": "https://bugzilla.suse.com/1137586" }, { "category": "external", "summary": "SUSE Bug 1142129 for CVE-2019-11479", "url": "https://bugzilla.suse.com/1142129" }, { "category": "external", "summary": "SUSE Bug 1143542 for CVE-2019-11479", "url": "https://bugzilla.suse.com/1143542" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2019-11479" }, { "cve": "CVE-2019-14615", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-14615" } ], "notes": [ { "category": "general", "text": "Insufficient control flow in certain data structures for some Intel(R) Processors with Intel(R) Processor Graphics may allow an unauthenticated user to potentially enable information disclosure via local access.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-14615", "url": "https://www.suse.com/security/cve/CVE-2019-14615" }, { "category": "external", "summary": "SUSE Bug 1160195 for CVE-2019-14615", "url": "https://bugzilla.suse.com/1160195" }, { "category": "external", "summary": "SUSE Bug 1165881 for CVE-2019-14615", "url": "https://bugzilla.suse.com/1165881" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-14615" }, { "cve": "CVE-2019-14814", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-14814" } ], "notes": [ { "category": "general", "text": "There is heap-based buffer overflow in Linux kernel, all versions up to, excluding 5.3, in the marvell wifi chip driver in Linux kernel, that allows local users to cause a denial of service(system crash) or possibly execute arbitrary code.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-14814", "url": "https://www.suse.com/security/cve/CVE-2019-14814" }, { "category": "external", "summary": "SUSE Bug 1146512 for CVE-2019-14814", "url": "https://bugzilla.suse.com/1146512" }, { "category": "external", "summary": "SUSE Bug 1173664 for CVE-2019-14814", "url": "https://bugzilla.suse.com/1173664" }, { "category": "external", "summary": "SUSE Bug 1173665 for CVE-2019-14814", "url": "https://bugzilla.suse.com/1173665" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2019-14814" }, { "cve": "CVE-2019-14896", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-14896" } ], "notes": [ { "category": "general", "text": "A heap-based buffer overflow vulnerability was found in the Linux kernel, version kernel-2.6.32, in Marvell WiFi chip driver. A remote attacker could cause a denial of service (system crash) or, possibly execute arbitrary code, when the lbs_ibss_join_existing function is called after a STA connects to an AP.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-14896", "url": "https://www.suse.com/security/cve/CVE-2019-14896" }, { "category": "external", "summary": "SUSE Bug 1157157 for CVE-2019-14896", "url": "https://bugzilla.suse.com/1157157" }, { "category": "external", "summary": "SUSE Bug 1160468 for CVE-2019-14896", "url": "https://bugzilla.suse.com/1160468" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2019-14896" }, { "cve": "CVE-2019-15030", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-15030" } ], "notes": [ { "category": "general", "text": "In the Linux kernel through 5.2.14 on the powerpc platform, a local user can read vector registers of other users\u0027 processes via a Facility Unavailable exception. To exploit the venerability, a local user starts a transaction (via the hardware transactional memory instruction tbegin) and then accesses vector registers. At some point, the vector registers will be corrupted with the values from a different local Linux process because of a missing arch/powerpc/kernel/process.c check.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-15030", "url": "https://www.suse.com/security/cve/CVE-2019-15030" }, { "category": "external", "summary": "SUSE Bug 1149713 for CVE-2019-15030", "url": "https://bugzilla.suse.com/1149713" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-15030" }, { "cve": "CVE-2019-15031", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-15031" } ], "notes": [ { "category": "general", "text": "In the Linux kernel through 5.2.14 on the powerpc platform, a local user can read vector registers of other users\u0027 processes via an interrupt. To exploit the venerability, a local user starts a transaction (via the hardware transactional memory instruction tbegin) and then accesses vector registers. At some point, the vector registers will be corrupted with the values from a different local Linux process, because MSR_TM_ACTIVE is misused in arch/powerpc/kernel/process.c.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-15031", "url": "https://www.suse.com/security/cve/CVE-2019-15031" }, { "category": "external", "summary": "SUSE Bug 1149713 for CVE-2019-15031", "url": "https://bugzilla.suse.com/1149713" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-15031" }, { "cve": "CVE-2019-15098", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-15098" } ], "notes": [ { "category": "general", "text": "drivers/net/wireless/ath/ath6kl/usb.c in the Linux kernel through 5.2.9 has a NULL pointer dereference via an incomplete address in an endpoint descriptor.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-15098", "url": "https://www.suse.com/security/cve/CVE-2019-15098" }, { "category": "external", "summary": "SUSE Bug 1146378 for CVE-2019-15098", "url": "https://bugzilla.suse.com/1146378" }, { "category": "external", "summary": "SUSE Bug 1146543 for CVE-2019-15098", "url": "https://bugzilla.suse.com/1146543" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-15098" }, { "cve": "CVE-2019-15099", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-15099" } ], "notes": [ { "category": "general", "text": "drivers/net/wireless/ath/ath10k/usb.c in the Linux kernel through 5.2.8 has a NULL pointer dereference via an incomplete address in an endpoint descriptor.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-15099", "url": "https://www.suse.com/security/cve/CVE-2019-15099" }, { "category": "external", "summary": "SUSE Bug 1146368 for CVE-2019-15099", "url": "https://bugzilla.suse.com/1146368" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-15099" }, { "cve": "CVE-2019-15290", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-15290" } ], "notes": [ { "category": "general", "text": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2019-15098. Reason: This candidate is a duplicate of CVE-2019-15098. Notes: All CVE users should reference CVE-2019-15098 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-15290", "url": "https://www.suse.com/security/cve/CVE-2019-15290" }, { "category": "external", "summary": "SUSE Bug 1146378 for CVE-2019-15290", "url": "https://bugzilla.suse.com/1146378" }, { "category": "external", "summary": "SUSE Bug 1146519 for CVE-2019-15290", "url": "https://bugzilla.suse.com/1146519" }, { "category": "external", "summary": "SUSE Bug 1146543 for CVE-2019-15290", "url": "https://bugzilla.suse.com/1146543" }, { "category": "external", "summary": "SUSE Bug 1158381 for CVE-2019-15290", "url": "https://bugzilla.suse.com/1158381" }, { "category": "external", "summary": "SUSE Bug 1158834 for CVE-2019-15290", "url": "https://bugzilla.suse.com/1158834" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-15290" }, { "cve": "CVE-2019-15504", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-15504" } ], "notes": [ { "category": "general", "text": "drivers/net/wireless/rsi/rsi_91x_usb.c in the Linux kernel through 5.2.9 has a Double Free via crafted USB device traffic (which may be remote via usbip or usbredir).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-15504", "url": "https://www.suse.com/security/cve/CVE-2019-15504" }, { "category": "external", "summary": "SUSE Bug 1147116 for CVE-2019-15504", "url": "https://bugzilla.suse.com/1147116" }, { "category": "external", "summary": "SUSE Bug 1185852 for CVE-2019-15504", "url": "https://bugzilla.suse.com/1185852" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2019-15504" }, { "cve": "CVE-2019-15902", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-15902" } ], "notes": [ { "category": "general", "text": "A backporting error was discovered in the Linux stable/longterm kernel 4.4.x through 4.4.190, 4.9.x through 4.9.190, 4.14.x through 4.14.141, 4.19.x through 4.19.69, and 5.2.x through 5.2.11. Misuse of the upstream \"x86/ptrace: Fix possible spectre-v1 in ptrace_get_debugreg()\" commit reintroduced the Spectre vulnerability that it aimed to eliminate. This occurred because the backport process depends on cherry picking specific commits, and because two (correctly ordered) code lines were swapped.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-15902", "url": "https://www.suse.com/security/cve/CVE-2019-15902" }, { "category": "external", "summary": "SUSE Bug 1149376 for CVE-2019-15902", "url": "https://bugzilla.suse.com/1149376" }, { "category": "external", "summary": "SUSE Bug 1155131 for CVE-2019-15902", "url": "https://bugzilla.suse.com/1155131" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-15902" }, { "cve": "CVE-2019-16231", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-16231" } ], "notes": [ { "category": "general", "text": "drivers/net/fjes/fjes_main.c in the Linux kernel 5.2.14 does not check the alloc_workqueue return value, leading to a NULL pointer dereference.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-16231", "url": "https://www.suse.com/security/cve/CVE-2019-16231" }, { "category": "external", "summary": "SUSE Bug 1150466 for CVE-2019-16231", "url": "https://bugzilla.suse.com/1150466" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "low" } ], "title": "CVE-2019-16231" }, { "cve": "CVE-2019-16232", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-16232" } ], "notes": [ { "category": "general", "text": "drivers/net/wireless/marvell/libertas/if_sdio.c in the Linux kernel 5.2.14 does not check the alloc_workqueue return value, leading to a NULL pointer dereference.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-16232", "url": "https://www.suse.com/security/cve/CVE-2019-16232" }, { "category": "external", "summary": "SUSE Bug 1150465 for CVE-2019-16232", "url": "https://bugzilla.suse.com/1150465" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "low" } ], "title": "CVE-2019-16232" }, { "cve": "CVE-2019-16234", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-16234" } ], "notes": [ { "category": "general", "text": "drivers/net/wireless/intel/iwlwifi/pcie/trans.c in the Linux kernel 5.2.14 does not check the alloc_workqueue return value, leading to a NULL pointer dereference.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-16234", "url": "https://www.suse.com/security/cve/CVE-2019-16234" }, { "category": "external", "summary": "SUSE Bug 1150452 for CVE-2019-16234", "url": "https://bugzilla.suse.com/1150452" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "low" } ], "title": "CVE-2019-16234" }, { "cve": "CVE-2019-17133", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-17133" } ], "notes": [ { "category": "general", "text": "In the Linux kernel through 5.3.2, cfg80211_mgd_wext_giwessid in net/wireless/wext-sme.c does not reject a long SSID IE, leading to a Buffer Overflow.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-17133", "url": "https://www.suse.com/security/cve/CVE-2019-17133" }, { "category": "external", "summary": "SUSE Bug 1153158 for CVE-2019-17133", "url": "https://bugzilla.suse.com/1153158" }, { "category": "external", "summary": "SUSE Bug 1153161 for CVE-2019-17133", "url": "https://bugzilla.suse.com/1153161" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2019-17133" }, { "cve": "CVE-2019-17666", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-17666" } ], "notes": [ { "category": "general", "text": "rtl_p2p_noa_ie in drivers/net/wireless/realtek/rtlwifi/ps.c in the Linux kernel through 5.3.6 lacks a certain upper-bound check, leading to a buffer overflow.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-17666", "url": "https://www.suse.com/security/cve/CVE-2019-17666" }, { "category": "external", "summary": "SUSE Bug 1154372 for CVE-2019-17666", "url": "https://bugzilla.suse.com/1154372" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-17666" }, { "cve": "CVE-2019-18808", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-18808" } ], "notes": [ { "category": "general", "text": "A memory leak in the ccp_run_sha_cmd() function in drivers/crypto/ccp/ccp-ops.c in the Linux kernel through 5.3.9 allows attackers to cause a denial of service (memory consumption), aka CID-128c66429247.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-18808", "url": "https://www.suse.com/security/cve/CVE-2019-18808" }, { "category": "external", "summary": "SUSE Bug 1156259 for CVE-2019-18808", "url": "https://bugzilla.suse.com/1156259" }, { "category": "external", "summary": "SUSE Bug 1189884 for CVE-2019-18808", "url": "https://bugzilla.suse.com/1189884" }, { "category": "external", "summary": "SUSE Bug 1190534 for CVE-2019-18808", "url": "https://bugzilla.suse.com/1190534" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-18808" }, { "cve": "CVE-2019-18812", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-18812" } ], "notes": [ { "category": "general", "text": "A memory leak in the sof_dfsentry_write() function in sound/soc/sof/debug.c in the Linux kernel through 5.3.9 allows attackers to cause a denial of service (memory consumption), aka CID-c0a333d842ef.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-18812", "url": "https://www.suse.com/security/cve/CVE-2019-18812" }, { "category": "external", "summary": "SUSE Bug 1156277 for CVE-2019-18812", "url": "https://bugzilla.suse.com/1156277" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-18812" }, { "cve": "CVE-2019-18813", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-18813" } ], "notes": [ { "category": "general", "text": "A memory leak in the dwc3_pci_probe() function in drivers/usb/dwc3/dwc3-pci.c in the Linux kernel through 5.3.9 allows attackers to cause a denial of service (memory consumption) by triggering platform_device_add_properties() failures, aka CID-9bbfceea12a8.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-18813", "url": "https://www.suse.com/security/cve/CVE-2019-18813" }, { "category": "external", "summary": "SUSE Bug 1156278 for CVE-2019-18813", "url": "https://bugzilla.suse.com/1156278" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-18813" }, { "cve": "CVE-2019-19252", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-19252" } ], "notes": [ { "category": "general", "text": "vcs_write in drivers/tty/vt/vc_screen.c in the Linux kernel through 5.3.13 does not prevent write access to vcsu devices, aka CID-0c9acb1af77a.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-19252", "url": "https://www.suse.com/security/cve/CVE-2019-19252" }, { "category": "external", "summary": "SUSE Bug 1157813 for CVE-2019-19252", "url": "https://bugzilla.suse.com/1157813" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-19252" }, { "cve": "CVE-2019-19332", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-19332" } ], "notes": [ { "category": "general", "text": "An out-of-bounds memory write issue was found in the Linux Kernel, version 3.13 through 5.4, in the way the Linux kernel\u0027s KVM hypervisor handled the \u0027KVM_GET_EMULATED_CPUID\u0027 ioctl(2) request to get CPUID features emulated by the KVM hypervisor. A user or process able to access the \u0027/dev/kvm\u0027 device could use this flaw to crash the system, resulting in a denial of service.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-19332", "url": "https://www.suse.com/security/cve/CVE-2019-19332" }, { "category": "external", "summary": "SUSE Bug 1158827 for CVE-2019-19332", "url": "https://bugzilla.suse.com/1158827" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-19332" }, { "cve": "CVE-2019-19338", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-19338" } ], "notes": [ { "category": "general", "text": "A flaw was found in the fix for CVE-2019-11135, in the Linux upstream kernel versions before 5.5 where, the way Intel CPUs handle speculative execution of instructions when a TSX Asynchronous Abort (TAA) error occurs. When a guest is running on a host CPU affected by the TAA flaw (TAA_NO=0), but is not affected by the MDS issue (MDS_NO=1), the guest was to clear the affected buffers by using a VERW instruction mechanism. But when the MDS_NO=1 bit was exported to the guests, the guests did not use the VERW mechanism to clear the affected buffers. This issue affects guests running on Cascade Lake CPUs and requires that host has \u0027TSX\u0027 enabled. Confidentiality of data is the highest threat associated with this vulnerability.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-19338", "url": "https://www.suse.com/security/cve/CVE-2019-19338" }, { "category": "external", "summary": "SUSE Bug 1158954 for CVE-2019-19338", "url": "https://bugzilla.suse.com/1158954" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-19338" }, { "cve": "CVE-2019-3016", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-3016" } ], "notes": [ { "category": "general", "text": "In a Linux KVM guest that has PV TLB enabled, a process in the guest kernel may be able to read memory locations from another process in the same guest. This problem is limit to the host running linux kernel 4.10 with a guest running linux kernel 4.16 or later. The problem mainly affects AMD processors but Intel CPUs cannot be ruled out.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-3016", "url": "https://www.suse.com/security/cve/CVE-2019-3016" }, { "category": "external", "summary": "SUSE Bug 1159281 for CVE-2019-3016", "url": "https://bugzilla.suse.com/1159281" }, { "category": "external", "summary": "SUSE Bug 1161154 for CVE-2019-3016", "url": "https://bugzilla.suse.com/1161154" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-3016" }, { "cve": "CVE-2019-3846", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-3846" } ], "notes": [ { "category": "general", "text": "A flaw that allowed an attacker to corrupt memory and possibly escalate privileges was found in the mwifiex kernel module while connecting to a malicious wireless network.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-3846", "url": "https://www.suse.com/security/cve/CVE-2019-3846" }, { "category": "external", "summary": "SUSE Bug 1136424 for CVE-2019-3846", "url": "https://bugzilla.suse.com/1136424" }, { "category": "external", "summary": "SUSE Bug 1136446 for CVE-2019-3846", "url": "https://bugzilla.suse.com/1136446" }, { "category": "external", "summary": "SUSE Bug 1156330 for CVE-2019-3846", "url": "https://bugzilla.suse.com/1156330" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2019-3846" }, { "cve": "CVE-2019-3882", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-3882" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel\u0027s vfio interface implementation that permits violation of the user\u0027s locked memory limit. If a device is bound to a vfio driver, such as vfio-pci, and the local attacker is administratively granted ownership of the device, it may cause a system memory exhaustion and thus a denial of service (DoS). Versions 3.10, 4.14 and 4.18 are vulnerable.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-3882", "url": "https://www.suse.com/security/cve/CVE-2019-3882" }, { "category": "external", "summary": "SUSE Bug 1131416 for CVE-2019-3882", "url": "https://bugzilla.suse.com/1131416" }, { "category": "external", "summary": "SUSE Bug 1131427 for CVE-2019-3882", "url": "https://bugzilla.suse.com/1131427" }, { "category": "external", "summary": "SUSE Bug 1133319 for CVE-2019-3882", "url": "https://bugzilla.suse.com/1133319" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-3882" }, { "cve": "CVE-2019-3887", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-3887" } ], "notes": [ { "category": "general", "text": "A flaw was found in the way KVM hypervisor handled x2APIC Machine Specific Rregister (MSR) access with nested(=1) virtualization enabled. In that, L1 guest could access L0\u0027s APIC register values via L2 guest, when \u0027virtualize x2APIC mode\u0027 is enabled. A guest could use this flaw to potentially crash the host kernel resulting in DoS issue. Kernel versions from 4.16 and newer are vulnerable to this issue.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-3887", "url": "https://www.suse.com/security/cve/CVE-2019-3887" }, { "category": "external", "summary": "SUSE Bug 1131800 for CVE-2019-3887", "url": "https://bugzilla.suse.com/1131800" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-3887" }, { "cve": "CVE-2019-6974", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-6974" } ], "notes": [ { "category": "general", "text": "In the Linux kernel before 4.20.8, kvm_ioctl_create_device in virt/kvm/kvm_main.c mishandles reference counting because of a race condition, leading to a use-after-free.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-6974", "url": "https://www.suse.com/security/cve/CVE-2019-6974" }, { "category": "external", "summary": "SUSE Bug 1124728 for CVE-2019-6974", "url": "https://bugzilla.suse.com/1124728" }, { "category": "external", "summary": "SUSE Bug 1124729 for CVE-2019-6974", "url": "https://bugzilla.suse.com/1124729" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2019-6974" }, { "cve": "CVE-2019-7221", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-7221" } ], "notes": [ { "category": "general", "text": "The KVM implementation in the Linux kernel through 4.20.5 has a Use-after-Free.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-7221", "url": "https://www.suse.com/security/cve/CVE-2019-7221" }, { "category": "external", "summary": "SUSE Bug 1124732 for CVE-2019-7221", "url": "https://bugzilla.suse.com/1124732" }, { "category": "external", "summary": "SUSE Bug 1124734 for CVE-2019-7221", "url": "https://bugzilla.suse.com/1124734" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2019-7221" }, { "cve": "CVE-2019-7222", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-7222" } ], "notes": [ { "category": "general", "text": "The KVM implementation in the Linux kernel through 4.20.5 has an Information Leak.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-7222", "url": "https://www.suse.com/security/cve/CVE-2019-7222" }, { "category": "external", "summary": "SUSE Bug 1124735 for CVE-2019-7222", "url": "https://bugzilla.suse.com/1124735" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 2.8, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "low" } ], "title": "CVE-2019-7222" }, { "cve": "CVE-2019-8564", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-8564" } ], "notes": [ { "category": "general", "text": "A logic issue was addressed with improved validation. This issue is fixed in macOS Mojave 10.14.4, Security Update 2019-002 High Sierra, Security Update 2019-002 Sierra. An attacker in a privileged network position can modify driver state.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-8564", "url": "https://www.suse.com/security/cve/CVE-2019-8564" }, { "category": "external", "summary": "SUSE Bug 1132673 for CVE-2019-8564", "url": "https://bugzilla.suse.com/1132673" }, { "category": "external", "summary": "SUSE Bug 1132828 for CVE-2019-8564", "url": "https://bugzilla.suse.com/1132828" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-8564" }, { "cve": "CVE-2019-8912", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-8912" } ], "notes": [ { "category": "general", "text": "In the Linux kernel through 4.20.11, af_alg_release() in crypto/af_alg.c neglects to set a NULL value for a certain structure member, which leads to a use-after-free in sockfs_setattr.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-8912", "url": "https://www.suse.com/security/cve/CVE-2019-8912" }, { "category": "external", "summary": "SUSE Bug 1125907 for CVE-2019-8912", "url": "https://bugzilla.suse.com/1125907" }, { "category": "external", "summary": "SUSE Bug 1126284 for CVE-2019-8912", "url": "https://bugzilla.suse.com/1126284" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2019-8912" }, { "cve": "CVE-2019-9500", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-9500" } ], "notes": [ { "category": "general", "text": "The Broadcom brcmfmac WiFi driver prior to commit 1b5e2423164b3670e8bc9174e4762d297990deff is vulnerable to a heap buffer overflow. If the Wake-up on Wireless LAN functionality is configured, a malicious event frame can be constructed to trigger an heap buffer overflow in the brcmf_wowl_nd_results function. This vulnerability can be exploited with compromised chipsets to compromise the host, or when used in combination with CVE-2019-9503, can be used remotely. In the worst case scenario, by sending specially-crafted WiFi packets, a remote, unauthenticated attacker may be able to execute arbitrary code on a vulnerable system. More typically, this vulnerability will result in denial-of-service conditions.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-9500", "url": "https://www.suse.com/security/cve/CVE-2019-9500" }, { "category": "external", "summary": "SUSE Bug 1132681 for CVE-2019-9500", "url": "https://bugzilla.suse.com/1132681" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-9500" }, { "cve": "CVE-2020-10135", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-10135" } ], "notes": [ { "category": "general", "text": "Legacy pairing and secure-connections pairing authentication in Bluetooth BR/EDR Core Specification v5.2 and earlier may allow an unauthenticated user to complete authentication without pairing credentials via adjacent access. An unauthenticated, adjacent attacker could impersonate a Bluetooth BR/EDR master or slave to pair with a previously paired remote device to successfully complete the authentication procedure without knowing the link key.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-10135", "url": "https://www.suse.com/security/cve/CVE-2020-10135" }, { "category": "external", "summary": "SUSE Bug 1171988 for CVE-2020-10135", "url": "https://bugzilla.suse.com/1171988" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2020-10135" }, { "cve": "CVE-2020-10766", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-10766" } ], "notes": [ { "category": "general", "text": "A logic bug flaw was found in Linux kernel before 5.8-rc1 in the implementation of SSBD. A bug in the logic handling allows an attacker with a local account to disable SSBD protection during a context switch when additional speculative execution mitigations are in place. This issue was introduced when the per task/process conditional STIPB switching was added on top of the existing SSBD switching. The highest threat from this vulnerability is to confidentiality.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-10766", "url": "https://www.suse.com/security/cve/CVE-2020-10766" }, { "category": "external", "summary": "SUSE Bug 1159281 for CVE-2020-10766", "url": "https://bugzilla.suse.com/1159281" }, { "category": "external", "summary": "SUSE Bug 1172781 for CVE-2020-10766", "url": "https://bugzilla.suse.com/1172781" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2020-10766" }, { "cve": "CVE-2020-10767", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-10767" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel before 5.8-rc1 in the implementation of the Enhanced IBPB (Indirect Branch Prediction Barrier). The IBPB mitigation will be disabled when STIBP is not available or when the Enhanced Indirect Branch Restricted Speculation (IBRS) is available. This flaw allows a local attacker to perform a Spectre V2 style attack when this configuration is active. The highest threat from this vulnerability is to confidentiality.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-10767", "url": "https://www.suse.com/security/cve/CVE-2020-10767" }, { "category": "external", "summary": "SUSE Bug 1159281 for CVE-2020-10767", "url": "https://bugzilla.suse.com/1159281" }, { "category": "external", "summary": "SUSE Bug 1172782 for CVE-2020-10767", "url": "https://bugzilla.suse.com/1172782" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2020-10767" }, { "cve": "CVE-2020-10768", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-10768" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux Kernel before 5.8-rc1 in the prctl() function, where it can be used to enable indirect branch speculation after it has been disabled. This call incorrectly reports it as being \u0027force disabled\u0027 when it is not and opens the system to Spectre v2 attacks. The highest threat from this vulnerability is to confidentiality.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-10768", "url": "https://www.suse.com/security/cve/CVE-2020-10768" }, { "category": "external", "summary": "SUSE Bug 1159281 for CVE-2020-10768", "url": "https://bugzilla.suse.com/1159281" }, { "category": "external", "summary": "SUSE Bug 1172783 for CVE-2020-10768", "url": "https://bugzilla.suse.com/1172783" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2020-10768" }, { "cve": "CVE-2020-12351", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-12351" } ], "notes": [ { "category": "general", "text": "Improper input validation in BlueZ may allow an unauthenticated user to potentially enable escalation of privilege via adjacent access.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-12351", "url": "https://www.suse.com/security/cve/CVE-2020-12351" }, { "category": "external", "summary": "SUSE Bug 1177724 for CVE-2020-12351", "url": "https://bugzilla.suse.com/1177724" }, { "category": "external", "summary": "SUSE Bug 1177729 for CVE-2020-12351", "url": "https://bugzilla.suse.com/1177729" }, { "category": "external", "summary": "SUSE Bug 1178397 for CVE-2020-12351", "url": "https://bugzilla.suse.com/1178397" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2020-12351" }, { "cve": "CVE-2020-12352", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-12352" } ], "notes": [ { "category": "general", "text": "Improper access control in BlueZ may allow an unauthenticated user to potentially enable information disclosure via adjacent access.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-12352", "url": "https://www.suse.com/security/cve/CVE-2020-12352" }, { "category": "external", "summary": "SUSE Bug 1177725 for CVE-2020-12352", "url": "https://bugzilla.suse.com/1177725" }, { "category": "external", "summary": "SUSE Bug 1178398 for CVE-2020-12352", "url": "https://bugzilla.suse.com/1178398" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.1, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2020-12352" }, { "cve": "CVE-2020-14331", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14331" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel\u0027s implementation of the invert video code on VGA consoles when a local attacker attempts to resize the console, calling an ioctl VT_RESIZE, which causes an out-of-bounds write to occur. This flaw allows a local user with access to the VGA console to crash the system, potentially escalating their privileges on the system. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14331", "url": "https://www.suse.com/security/cve/CVE-2020-14331" }, { "category": "external", "summary": "SUSE Bug 1174205 for CVE-2020-14331", "url": "https://bugzilla.suse.com/1174205" }, { "category": "external", "summary": "SUSE Bug 1174247 for CVE-2020-14331", "url": "https://bugzilla.suse.com/1174247" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2020-14331" }, { "cve": "CVE-2020-14386", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14386" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel before 5.9-rc4. Memory corruption can be exploited to gain root privileges from unprivileged processes. The highest threat from this vulnerability is to data confidentiality and integrity.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14386", "url": "https://www.suse.com/security/cve/CVE-2020-14386" }, { "category": "external", "summary": "SUSE Bug 1176069 for CVE-2020-14386", "url": "https://bugzilla.suse.com/1176069" }, { "category": "external", "summary": "SUSE Bug 1176072 for CVE-2020-14386", "url": "https://bugzilla.suse.com/1176072" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2020-14386" }, { "cve": "CVE-2020-24586", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-24586" } ], "notes": [ { "category": "general", "text": "The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn\u0027t require that received fragments be cleared from memory after (re)connecting to a network. Under the right circumstances, when another device sends fragmented frames encrypted using WEP, CCMP, or GCMP, this can be abused to inject arbitrary network packets and/or exfiltrate user data.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-24586", "url": "https://www.suse.com/security/cve/CVE-2020-24586" }, { "category": "external", "summary": "SUSE Bug 1185859 for CVE-2020-24586", "url": "https://bugzilla.suse.com/1185859" }, { "category": "external", "summary": "SUSE Bug 1192868 for CVE-2020-24586", "url": "https://bugzilla.suse.com/1192868" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2020-24586" }, { "cve": "CVE-2020-24587", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-24587" } ], "notes": [ { "category": "general", "text": "The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn\u0027t require that all fragments of a frame are encrypted under the same key. An adversary can abuse this to decrypt selected fragments when another device sends fragmented frames and the WEP, CCMP, or GCMP encryption key is periodically renewed.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-24587", "url": "https://www.suse.com/security/cve/CVE-2020-24587" }, { "category": "external", "summary": "SUSE Bug 1185859 for CVE-2020-24587", "url": "https://bugzilla.suse.com/1185859" }, { "category": "external", "summary": "SUSE Bug 1185862 for CVE-2020-24587", "url": "https://bugzilla.suse.com/1185862" }, { "category": "external", "summary": "SUSE Bug 1192868 for CVE-2020-24587", "url": "https://bugzilla.suse.com/1192868" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2020-24587" }, { "cve": "CVE-2020-24588", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-24588" } ], "notes": [ { "category": "general", "text": "The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn\u0027t require that the A-MSDU flag in the plaintext QoS header field is authenticated. Against devices that support receiving non-SSP A-MSDU frames (which is mandatory as part of 802.11n), an adversary can abuse this to inject arbitrary network packets.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-24588", "url": "https://www.suse.com/security/cve/CVE-2020-24588" }, { "category": "external", "summary": "SUSE Bug 1185861 for CVE-2020-24588", "url": "https://bugzilla.suse.com/1185861" }, { "category": "external", "summary": "SUSE Bug 1192868 for CVE-2020-24588", "url": "https://bugzilla.suse.com/1192868" }, { "category": "external", "summary": "SUSE Bug 1199701 for CVE-2020-24588", "url": "https://bugzilla.suse.com/1199701" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2020-24588" }, { "cve": "CVE-2020-25639", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-25639" } ], "notes": [ { "category": "general", "text": "A NULL pointer dereference flaw was found in the Linux kernel\u0027s GPU Nouveau driver functionality in versions prior to 5.12-rc1 in the way the user calls ioctl DRM_IOCTL_NOUVEAU_CHANNEL_ALLOC. This flaw allows a local user to crash the system.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-25639", "url": "https://www.suse.com/security/cve/CVE-2020-25639" }, { "category": "external", "summary": "SUSE Bug 1176846 for CVE-2020-25639", "url": "https://bugzilla.suse.com/1176846" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2020-25639" }, { "cve": "CVE-2020-25656", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-25656" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel. A use-after-free was found in the way the console subsystem was using ioctls KDGKBSENT and KDSKBSENT. A local user could use this flaw to get read memory access out of bounds. The highest threat from this vulnerability is to data confidentiality.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-25656", "url": "https://www.suse.com/security/cve/CVE-2020-25656" }, { "category": "external", "summary": "SUSE Bug 1177766 for CVE-2020-25656", "url": "https://bugzilla.suse.com/1177766" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2020-25656" }, { "cve": "CVE-2020-25668", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-25668" } ], "notes": [ { "category": "general", "text": "A flaw was found in Linux Kernel because access to the global variable fg_console is not properly synchronized leading to a use after free in con_font_op.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-25668", "url": "https://www.suse.com/security/cve/CVE-2020-25668" }, { "category": "external", "summary": "SUSE Bug 1178123 for CVE-2020-25668", "url": "https://bugzilla.suse.com/1178123" }, { "category": "external", "summary": "SUSE Bug 1178622 for CVE-2020-25668", "url": "https://bugzilla.suse.com/1178622" }, { "category": "external", "summary": "SUSE Bug 1196914 for CVE-2020-25668", "url": "https://bugzilla.suse.com/1196914" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2020-25668" }, { "cve": "CVE-2020-26141", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-26141" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the ALFA Windows 10 driver 6.1316.1209 for AWUS036H. The Wi-Fi implementation does not verify the Message Integrity Check (authenticity) of fragmented TKIP frames. An adversary can abuse this to inject and possibly decrypt packets in WPA or WPA2 networks that support the TKIP data-confidentiality protocol.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-26141", "url": "https://www.suse.com/security/cve/CVE-2020-26141" }, { "category": "external", "summary": "SUSE Bug 1185987 for CVE-2020-26141", "url": "https://bugzilla.suse.com/1185987" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2020-26141" }, { "cve": "CVE-2020-2732", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-2732" } ], "notes": [ { "category": "general", "text": "A flaw was discovered in the way that the KVM hypervisor handled instruction emulation for an L2 guest when nested virtualisation is enabled. Under some circumstances, an L2 guest may trick the L0 guest into accessing sensitive L1 resources that should be inaccessible to the L2 guest.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-2732", "url": "https://www.suse.com/security/cve/CVE-2020-2732" }, { "category": "external", "summary": "SUSE Bug 1163971 for CVE-2020-2732", "url": "https://bugzilla.suse.com/1163971" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.2, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:L/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "low" } ], "title": "CVE-2020-2732" }, { "cve": "CVE-2020-29660", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-29660" } ], "notes": [ { "category": "general", "text": "A locking inconsistency issue was discovered in the tty subsystem of the Linux kernel through 5.9.13. drivers/tty/tty_io.c and drivers/tty/tty_jobctrl.c may allow a read-after-free attack against TIOCGSID, aka CID-c8bcd9c5be24.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-29660", "url": "https://www.suse.com/security/cve/CVE-2020-29660" }, { "category": "external", "summary": "SUSE Bug 1179745 for CVE-2020-29660", "url": "https://bugzilla.suse.com/1179745" }, { "category": "external", "summary": "SUSE Bug 1179877 for CVE-2020-29660", "url": "https://bugzilla.suse.com/1179877" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2020-29660" }, { "cve": "CVE-2020-29661", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-29661" } ], "notes": [ { "category": "general", "text": "A locking issue was discovered in the tty subsystem of the Linux kernel through 5.9.13. drivers/tty/tty_jobctrl.c allows a use-after-free attack against TIOCSPGRP, aka CID-54ffccbf053b.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-29661", "url": "https://www.suse.com/security/cve/CVE-2020-29661" }, { "category": "external", "summary": "SUSE Bug 1179745 for CVE-2020-29661", "url": "https://bugzilla.suse.com/1179745" }, { "category": "external", "summary": "SUSE Bug 1179877 for CVE-2020-29661", "url": "https://bugzilla.suse.com/1179877" }, { "category": "external", "summary": "SUSE Bug 1214268 for CVE-2020-29661", "url": "https://bugzilla.suse.com/1214268" }, { "category": "external", "summary": "SUSE Bug 1218966 for CVE-2020-29661", "url": "https://bugzilla.suse.com/1218966" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2020-29661" }, { "cve": "CVE-2020-8648", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-8648" } ], "notes": [ { "category": "general", "text": "There is a use-after-free vulnerability in the Linux kernel through 5.5.2 in the n_tty_receive_buf_common function in drivers/tty/n_tty.c.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-8648", "url": "https://www.suse.com/security/cve/CVE-2020-8648" }, { "category": "external", "summary": "SUSE Bug 1162928 for CVE-2020-8648", "url": "https://bugzilla.suse.com/1162928" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2020-8648" }, { "cve": "CVE-2020-8694", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-8694" } ], "notes": [ { "category": "general", "text": "Insufficient access control in the Linux kernel driver for some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-8694", "url": "https://www.suse.com/security/cve/CVE-2020-8694" }, { "category": "external", "summary": "SUSE Bug 1170415 for CVE-2020-8694", "url": "https://bugzilla.suse.com/1170415" }, { "category": "external", "summary": "SUSE Bug 1170446 for CVE-2020-8694", "url": "https://bugzilla.suse.com/1170446" }, { "category": "external", "summary": "SUSE Bug 1178591 for CVE-2020-8694", "url": "https://bugzilla.suse.com/1178591" }, { "category": "external", "summary": "SUSE Bug 1178700 for CVE-2020-8694", "url": "https://bugzilla.suse.com/1178700" }, { "category": "external", "summary": "SUSE Bug 1179661 for CVE-2020-8694", "url": "https://bugzilla.suse.com/1179661" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2020-8694" }, { "cve": "CVE-2021-23133", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-23133" } ], "notes": [ { "category": "general", "text": "A race condition in Linux kernel SCTP sockets (net/sctp/socket.c) before 5.12-rc8 can lead to kernel privilege escalation from the context of a network service or an unprivileged process. If sctp_destroy_sock is called without sock_net(sk)-\u003esctp.addr_wq_lock then an element is removed from the auto_asconf_splist list without any proper locking. This can be exploited by an attacker with network service privileges to escalate to root or from the context of an unprivileged user directly if a BPF_CGROUP_INET_SOCK_CREATE is attached which denies creation of some SCTP socket.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-23133", "url": "https://www.suse.com/security/cve/CVE-2021-23133" }, { "category": "external", "summary": "SUSE Bug 1184675 for CVE-2021-23133", "url": "https://bugzilla.suse.com/1184675" }, { "category": "external", "summary": "SUSE Bug 1185901 for CVE-2021-23133", "url": "https://bugzilla.suse.com/1185901" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2021-23133" }, { "cve": "CVE-2021-26708", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-26708" } ], "notes": [ { "category": "general", "text": "A local privilege escalation was discovered in the Linux kernel before 5.10.13. Multiple race conditions in the AF_VSOCK implementation are caused by wrong locking in net/vmw_vsock/af_vsock.c. The race conditions were implicitly introduced in the commits that added VSOCK multi-transport support.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-26708", "url": "https://www.suse.com/security/cve/CVE-2021-26708" }, { "category": "external", "summary": "SUSE Bug 1181806 for CVE-2021-26708", "url": "https://bugzilla.suse.com/1181806" }, { "category": "external", "summary": "SUSE Bug 1183298 for CVE-2021-26708", "url": "https://bugzilla.suse.com/1183298" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2021-26708" }, { "cve": "CVE-2021-28971", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-28971" } ], "notes": [ { "category": "general", "text": "In intel_pmu_drain_pebs_nhm in arch/x86/events/intel/ds.c in the Linux kernel through 5.11.8 on some Haswell CPUs, userspace applications (such as perf-fuzzer) can cause a system crash because the PEBS status in a PEBS record is mishandled, aka CID-d88d05a9e0b6.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-28971", "url": "https://www.suse.com/security/cve/CVE-2021-28971" }, { "category": "external", "summary": "SUSE Bug 1184196 for CVE-2021-28971", "url": "https://bugzilla.suse.com/1184196" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2021-28971" }, { "cve": "CVE-2021-32606", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-32606" } ], "notes": [ { "category": "general", "text": "In the Linux kernel 5.11 through 5.12.2, isotp_setsockopt in net/can/isotp.c allows privilege escalation to root by leveraging a use-after-free. (This does not affect earlier versions that lack CAN ISOTP SF_BROADCAST support.)", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-32606", "url": "https://www.suse.com/security/cve/CVE-2021-32606" }, { "category": "external", "summary": "SUSE Bug 1185953 for CVE-2021-32606", "url": "https://bugzilla.suse.com/1185953" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2021-32606" }, { "cve": "CVE-2021-33909", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-33909" } ], "notes": [ { "category": "general", "text": "fs/seq_file.c in the Linux kernel 3.16 through 5.13.x before 5.13.4 does not properly restrict seq buffer allocations, leading to an integer overflow, an Out-of-bounds Write, and escalation to root by an unprivileged user, aka CID-8cae8cd89f05.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-33909", "url": "https://www.suse.com/security/cve/CVE-2021-33909" }, { "category": "external", "summary": "SUSE Bug 1188062 for CVE-2021-33909", "url": "https://bugzilla.suse.com/1188062" }, { "category": "external", "summary": "SUSE Bug 1188063 for CVE-2021-33909", "url": "https://bugzilla.suse.com/1188063" }, { "category": "external", "summary": "SUSE Bug 1188257 for CVE-2021-33909", "url": "https://bugzilla.suse.com/1188257" }, { "category": "external", "summary": "SUSE Bug 1189302 for CVE-2021-33909", "url": "https://bugzilla.suse.com/1189302" }, { "category": "external", "summary": "SUSE Bug 1190859 for CVE-2021-33909", "url": "https://bugzilla.suse.com/1190859" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2021-33909" }, { "cve": "CVE-2021-3483", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-3483" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Nosy driver in the Linux kernel. This issue allows a device to be inserted twice into a doubly-linked list, leading to a use-after-free when one of these devices is removed. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability. Versions before kernel 5.12-rc6 are affected", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-3483", "url": "https://www.suse.com/security/cve/CVE-2021-3483" }, { "category": "external", "summary": "SUSE Bug 1184393 for CVE-2021-3483", "url": "https://bugzilla.suse.com/1184393" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2021-3483" }, { "cve": "CVE-2021-3489", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-3489" } ], "notes": [ { "category": "general", "text": "The eBPF RINGBUF bpf_ringbuf_reserve() function in the Linux kernel did not check that the allocated size was smaller than the ringbuf size, allowing an attacker to perform out-of-bounds writes within the kernel and therefore, arbitrary code execution. This issue was fixed via commit 4b81ccebaeee (\"bpf, ringbuf: Deny reserve of buffers larger than ringbuf\") (v5.13-rc4) and backported to the stable kernels in v5.12.4, v5.11.21, and v5.10.37. It was introduced via 457f44363a88 (\"bpf: Implement BPF ring buffer and verifier support for it\") (v5.8-rc1).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-3489", "url": "https://www.suse.com/security/cve/CVE-2021-3489" }, { "category": "external", "summary": "SUSE Bug 1185640 for CVE-2021-3489", "url": "https://bugzilla.suse.com/1185640" }, { "category": "external", "summary": "SUSE Bug 1185856 for CVE-2021-3489", "url": "https://bugzilla.suse.com/1185856" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2021-3489" }, { "cve": "CVE-2021-3490", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-3490" } ], "notes": [ { "category": "general", "text": "The eBPF ALU32 bounds tracking for bitwise ops (AND, OR and XOR) in the Linux kernel did not properly update 32-bit bounds, which could be turned into out of bounds reads and writes in the Linux kernel and therefore, arbitrary code execution. This issue was fixed via commit 049c4e13714e (\"bpf: Fix alu32 const subreg bound tracking on bitwise operations\") (v5.13-rc4) and backported to the stable kernels in v5.12.4, v5.11.21, and v5.10.37. The AND/OR issues were introduced by commit 3f50f132d840 (\"bpf: Verifier, do explicit ALU32 bounds tracking\") (5.7-rc1) and the XOR variant was introduced by 2921c90d4718 (\"bpf:Fix a verifier failure with xor\") ( 5.10-rc1).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-3490", "url": "https://www.suse.com/security/cve/CVE-2021-3490" }, { "category": "external", "summary": "SUSE Bug 1185641 for CVE-2021-3490", "url": "https://bugzilla.suse.com/1185641" }, { "category": "external", "summary": "SUSE Bug 1185796 for CVE-2021-3490", "url": "https://bugzilla.suse.com/1185796" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2021-3490" }, { "cve": "CVE-2021-3491", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-3491" } ], "notes": [ { "category": "general", "text": "The io_uring subsystem in the Linux kernel allowed the MAX_RW_COUNT limit to be bypassed in the PROVIDE_BUFFERS operation, which led to negative values being usedin mem_rw when reading /proc/\u003cPID\u003e/mem. This could be used to create a heap overflow leading to arbitrary code execution in the kernel. It was addressed via commit d1f82808877b (\"io_uring: truncate lengths larger than MAX_RW_COUNT on provide buffers\") (v5.13-rc1) and backported to the stable kernels in v5.12.4, v5.11.21, and v5.10.37. It was introduced in ddf0322db79c (\"io_uring: add IORING_OP_PROVIDE_BUFFERS\") (v5.7-rc1).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-3491", "url": "https://www.suse.com/security/cve/CVE-2021-3491" }, { "category": "external", "summary": "SUSE Bug 1185642 for CVE-2021-3491", "url": "https://bugzilla.suse.com/1185642" }, { "category": "external", "summary": "SUSE Bug 1187090 for CVE-2021-3491", "url": "https://bugzilla.suse.com/1187090" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2021-3491" }, { "cve": "CVE-2021-3542", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-3542" } ], "notes": [ { "category": "general", "text": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2021-42739. Reason: This candidate is a reservation duplicate of CVE-2021-42739. Notes: All CVE users should reference CVE-2021-42739 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-3542", "url": "https://www.suse.com/security/cve/CVE-2021-3542" }, { "category": "external", "summary": "SUSE Bug 1184673 for CVE-2021-3542", "url": "https://bugzilla.suse.com/1184673" }, { "category": "external", "summary": "SUSE Bug 1186063 for CVE-2021-3542", "url": "https://bugzilla.suse.com/1186063" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2021-3542" }, { "cve": "CVE-2021-3640", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-3640" } ], "notes": [ { "category": "general", "text": "A flaw use-after-free in function sco_sock_sendmsg() of the Linux kernel HCI subsystem was found in the way user calls ioct UFFDIO_REGISTER or other way triggers race condition of the call sco_conn_del() together with the call sco_sock_sendmsg() with the expected controllable faulting memory page. A privileged local user could use this flaw to crash the system or escalate their privileges on the system.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-3640", "url": "https://www.suse.com/security/cve/CVE-2021-3640" }, { "category": "external", "summary": "SUSE Bug 1188172 for CVE-2021-3640", "url": "https://bugzilla.suse.com/1188172" }, { "category": "external", "summary": "SUSE Bug 1188613 for CVE-2021-3640", "url": "https://bugzilla.suse.com/1188613" }, { "category": "external", "summary": "SUSE Bug 1191530 for CVE-2021-3640", "url": "https://bugzilla.suse.com/1191530" }, { "category": "external", "summary": "SUSE Bug 1196810 for CVE-2021-3640", "url": "https://bugzilla.suse.com/1196810" }, { "category": "external", "summary": "SUSE Bug 1196914 for CVE-2021-3640", "url": "https://bugzilla.suse.com/1196914" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2021-3640" }, { "cve": "CVE-2021-3653", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-3653" } ], "notes": [ { "category": "general", "text": "A flaw was found in the KVM\u0027s AMD code for supporting SVM nested virtualization. The flaw occurs when processing the VMCB (virtual machine control block) provided by the L1 guest to spawn/handle a nested guest (L2). Due to improper validation of the \"int_ctl\" field, this issue could allow a malicious L1 to enable AVIC support (Advanced Virtual Interrupt Controller) for the L2 guest. As a result, the L2 guest would be allowed to read/write physical pages of the host, resulting in a crash of the entire system, leak of sensitive data or potential guest-to-host escape. This flaw affects Linux kernel versions prior to 5.14-rc7.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-3653", "url": "https://www.suse.com/security/cve/CVE-2021-3653" }, { "category": "external", "summary": "SUSE Bug 1189399 for CVE-2021-3653", "url": "https://bugzilla.suse.com/1189399" }, { "category": "external", "summary": "SUSE Bug 1189420 for CVE-2021-3653", "url": "https://bugzilla.suse.com/1189420" }, { "category": "external", "summary": "SUSE Bug 1196914 for CVE-2021-3653", "url": "https://bugzilla.suse.com/1196914" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2021-3653" }, { "cve": "CVE-2021-3656", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-3656" } ], "notes": [ { "category": "general", "text": "A flaw was found in the KVM\u0027s AMD code for supporting SVM nested virtualization. The flaw occurs when processing the VMCB (virtual machine control block) provided by the L1 guest to spawn/handle a nested guest (L2). Due to improper validation of the \"virt_ext\" field, this issue could allow a malicious L1 to disable both VMLOAD/VMSAVE intercepts and VLS (Virtual VMLOAD/VMSAVE) for the L2 guest. As a result, the L2 guest would be allowed to read/write physical pages of the host, resulting in a crash of the entire system, leak of sensitive data or potential guest-to-host escape.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-3656", "url": "https://www.suse.com/security/cve/CVE-2021-3656" }, { "category": "external", "summary": "SUSE Bug 1189400 for CVE-2021-3656", "url": "https://bugzilla.suse.com/1189400" }, { "category": "external", "summary": "SUSE Bug 1189418 for CVE-2021-3656", "url": "https://bugzilla.suse.com/1189418" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2021-3656" }, { "cve": "CVE-2021-3744", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-3744" } ], "notes": [ { "category": "general", "text": "A memory leak flaw was found in the Linux kernel in the ccp_run_aes_gcm_cmd() function in drivers/crypto/ccp/ccp-ops.c, which allows attackers to cause a denial of service (memory consumption). This vulnerability is similar with the older CVE-2019-18808.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-3744", "url": "https://www.suse.com/security/cve/CVE-2021-3744" }, { "category": "external", "summary": "SUSE Bug 1189884 for CVE-2021-3744", "url": "https://bugzilla.suse.com/1189884" }, { "category": "external", "summary": "SUSE Bug 1190534 for CVE-2021-3744", "url": "https://bugzilla.suse.com/1190534" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2021-3744" }, { "cve": "CVE-2021-3753", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-3753" } ], "notes": [ { "category": "general", "text": "A race problem was seen in the vt_k_ioctl in drivers/tty/vt/vt_ioctl.c in the Linux kernel, which may cause an out of bounds read in vt as the write access to vc_mode is not protected by lock-in vt_ioctl (KDSETMDE). The highest threat from this vulnerability is to data confidentiality.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-3753", "url": "https://www.suse.com/security/cve/CVE-2021-3753" }, { "category": "external", "summary": "SUSE Bug 1190025 for CVE-2021-3753", "url": "https://bugzilla.suse.com/1190025" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 2.9, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "low" } ], "title": "CVE-2021-3753" }, { "cve": "CVE-2021-37576", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-37576" } ], "notes": [ { "category": "general", "text": "arch/powerpc/kvm/book3s_rtas.c in the Linux kernel through 5.13.5 on the powerpc platform allows KVM guest OS users to cause host OS memory corruption via rtas_args.nargs, aka CID-f62f3c20647e.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-37576", "url": "https://www.suse.com/security/cve/CVE-2021-37576" }, { "category": "external", "summary": "SUSE Bug 1188838 for CVE-2021-37576", "url": "https://bugzilla.suse.com/1188838" }, { "category": "external", "summary": "SUSE Bug 1188842 for CVE-2021-37576", "url": "https://bugzilla.suse.com/1188842" }, { "category": "external", "summary": "SUSE Bug 1190276 for CVE-2021-37576", "url": "https://bugzilla.suse.com/1190276" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2021-37576" }, { "cve": "CVE-2021-3759", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-3759" } ], "notes": [ { "category": "general", "text": "A memory overflow vulnerability was found in the Linux kernel\u0027s ipc functionality of the memcg subsystem, in the way a user calls the semget function multiple times, creating semaphores. This flaw allows a local user to starve the resources, causing a denial of service. The highest threat from this vulnerability is to system availability.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-3759", "url": "https://www.suse.com/security/cve/CVE-2021-3759" }, { "category": "external", "summary": "SUSE Bug 1190115 for CVE-2021-3759", "url": "https://bugzilla.suse.com/1190115" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2021-3759" }, { "cve": "CVE-2021-38166", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-38166" } ], "notes": [ { "category": "general", "text": "In kernel/bpf/hashtab.c in the Linux kernel through 5.13.8, there is an integer overflow and out-of-bounds write when many elements are placed in a single bucket. NOTE: exploitation might be impractical without the CAP_SYS_ADMIN capability.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-38166", "url": "https://www.suse.com/security/cve/CVE-2021-38166" }, { "category": "external", "summary": "SUSE Bug 1189233 for CVE-2021-38166", "url": "https://bugzilla.suse.com/1189233" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2021-38166" }, { "cve": "CVE-2021-43976", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-43976" } ], "notes": [ { "category": "general", "text": "In the Linux kernel through 5.15.2, mwifiex_usb_recv in drivers/net/wireless/marvell/mwifiex/usb.c allows an attacker (who can connect a crafted USB device) to cause a denial of service (skb_over_panic).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-43976", "url": "https://www.suse.com/security/cve/CVE-2021-43976" }, { "category": "external", "summary": "SUSE Bug 1192847 for CVE-2021-43976", "url": "https://bugzilla.suse.com/1192847" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2021-43976" }, { "cve": "CVE-2022-0185", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-0185" } ], "notes": [ { "category": "general", "text": "A heap-based buffer overflow flaw was found in the way the legacy_parse_param function in the Filesystem Context functionality of the Linux kernel verified the supplied parameters length. An unprivileged (in case of unprivileged user namespaces enabled, otherwise needs namespaced CAP_SYS_ADMIN privilege) local user able to open a filesystem that does not support the Filesystem Context API (and thus fallbacks to legacy handling) could use this flaw to escalate their privileges on the system.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-0185", "url": "https://www.suse.com/security/cve/CVE-2022-0185" }, { "category": "external", "summary": "SUSE Bug 1194517 for CVE-2022-0185", "url": "https://bugzilla.suse.com/1194517" }, { "category": "external", "summary": "SUSE Bug 1194737 for CVE-2022-0185", "url": "https://bugzilla.suse.com/1194737" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2022-0185" }, { "cve": "CVE-2022-0330", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-0330" } ], "notes": [ { "category": "general", "text": "A random memory access flaw was found in the Linux kernel\u0027s GPU i915 kernel driver functionality in the way a user may run malicious code on the GPU. This flaw allows a local user to crash the system or escalate their privileges on the system.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-0330", "url": "https://www.suse.com/security/cve/CVE-2022-0330" }, { "category": "external", "summary": "SUSE Bug 1194880 for CVE-2022-0330", "url": "https://bugzilla.suse.com/1194880" }, { "category": "external", "summary": "SUSE Bug 1195950 for CVE-2022-0330", "url": "https://bugzilla.suse.com/1195950" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2022-0330" }, { "cve": "CVE-2022-0847", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-0847" } ], "notes": [ { "category": "general", "text": "A flaw was found in the way the \"flags\" member of the new pipe buffer structure was lacking proper initialization in copy_page_to_iter_pipe and push_pipe functions in the Linux kernel and could thus contain stale values. An unprivileged local user could use this flaw to write to pages in the page cache backed by read only files and as such escalate their privileges on the system.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-0847", "url": "https://www.suse.com/security/cve/CVE-2022-0847" }, { "category": "external", "summary": "SUSE Bug 1196584 for CVE-2022-0847", "url": "https://bugzilla.suse.com/1196584" }, { "category": "external", "summary": "SUSE Bug 1196601 for CVE-2022-0847", "url": "https://bugzilla.suse.com/1196601" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2022-0847" }, { "cve": "CVE-2022-0886", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-0886" } ], "notes": [ { "category": "general", "text": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2022-27666. Reason: This candidate is a reservation duplicate of CVE-2022-27666. Notes: All CVE users should reference CVE-2022-27666 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-0886", "url": "https://www.suse.com/security/cve/CVE-2022-0886" }, { "category": "external", "summary": "SUSE Bug 1197131 for CVE-2022-0886", "url": "https://bugzilla.suse.com/1197131" }, { "category": "external", "summary": "SUSE Bug 1197133 for CVE-2022-0886", "url": "https://bugzilla.suse.com/1197133" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2022-0886" }, { "cve": "CVE-2022-1462", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-1462" } ], "notes": [ { "category": "general", "text": "An out-of-bounds read flaw was found in the Linux kernel\u0027s TeleTYpe subsystem. The issue occurs in how a user triggers a race condition using ioctls TIOCSPTLCK and TIOCGPTPEER and TIOCSTI and TCXONC with leakage of memory in the flush_to_ldisc function. This flaw allows a local user to crash the system or read unauthorized random data from memory.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-1462", "url": "https://www.suse.com/security/cve/CVE-2022-1462" }, { "category": "external", "summary": "SUSE Bug 1198829 for CVE-2022-1462", "url": "https://bugzilla.suse.com/1198829" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2022-1462" }, { "cve": "CVE-2022-1516", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-1516" } ], "notes": [ { "category": "general", "text": "A NULL pointer dereference flaw was found in the Linux kernel\u0027s X.25 set of standardized network protocols functionality in the way a user terminates their session using a simulated Ethernet card and continued usage of this connection. This flaw allows a local user to crash the system.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-1516", "url": "https://www.suse.com/security/cve/CVE-2022-1516" }, { "category": "external", "summary": "SUSE Bug 1199012 for CVE-2022-1516", "url": "https://bugzilla.suse.com/1199012" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2022-1516" }, { "cve": "CVE-2022-1679", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-1679" } ], "notes": [ { "category": "general", "text": "A use-after-free flaw was found in the Linux kernel\u0027s Atheros wireless adapter driver in the way a user forces the ath9k_htc_wait_for_target function to fail with some input messages. This flaw allows a local user to crash or potentially escalate their privileges on the system.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-1679", "url": "https://www.suse.com/security/cve/CVE-2022-1679" }, { "category": "external", "summary": "SUSE Bug 1199487 for CVE-2022-1679", "url": "https://bugzilla.suse.com/1199487" }, { "category": "external", "summary": "SUSE Bug 1201080 for CVE-2022-1679", "url": "https://bugzilla.suse.com/1201080" }, { "category": "external", "summary": "SUSE Bug 1201832 for CVE-2022-1679", "url": "https://bugzilla.suse.com/1201832" }, { "category": "external", "summary": "SUSE Bug 1204132 for CVE-2022-1679", "url": "https://bugzilla.suse.com/1204132" }, { "category": "external", "summary": "SUSE Bug 1212316 for CVE-2022-1679", "url": "https://bugzilla.suse.com/1212316" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2022-1679" }, { "cve": "CVE-2022-1729", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-1729" } ], "notes": [ { "category": "general", "text": "A race condition was found the Linux kernel in perf_event_open() which can be exploited by an unprivileged user to gain root privileges. The bug allows to build several exploit primitives such as kernel address information leak, arbitrary execution, etc.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-1729", "url": "https://www.suse.com/security/cve/CVE-2022-1729" }, { "category": "external", "summary": "SUSE Bug 1199507 for CVE-2022-1729", "url": "https://bugzilla.suse.com/1199507" }, { "category": "external", "summary": "SUSE Bug 1199697 for CVE-2022-1729", "url": "https://bugzilla.suse.com/1199697" }, { "category": "external", "summary": "SUSE Bug 1201832 for CVE-2022-1729", "url": "https://bugzilla.suse.com/1201832" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.2, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2022-1729" }, { "cve": "CVE-2022-1852", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-1852" } ], "notes": [ { "category": "general", "text": "A NULL pointer dereference flaw was found in the Linux kernel\u0027s KVM module, which can lead to a denial of service in the x86_emulate_insn in arch/x86/kvm/emulate.c. This flaw occurs while executing an illegal instruction in guest in the Intel CPU.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-1852", "url": "https://www.suse.com/security/cve/CVE-2022-1852" }, { "category": "external", "summary": "SUSE Bug 1199875 for CVE-2022-1852", "url": "https://bugzilla.suse.com/1199875" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2022-1852" }, { "cve": "CVE-2022-1966", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-1966" } ], "notes": [ { "category": "general", "text": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2022-32250. Reason: This candidate is a duplicate of CVE-2022-32250. Notes: All CVE users should reference CVE-2022-32250 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-1966", "url": "https://www.suse.com/security/cve/CVE-2022-1966" }, { "category": "external", "summary": "SUSE Bug 1200015 for CVE-2022-1966", "url": "https://bugzilla.suse.com/1200015" }, { "category": "external", "summary": "SUSE Bug 1200268 for CVE-2022-1966", "url": "https://bugzilla.suse.com/1200268" }, { "category": "external", "summary": "SUSE Bug 1200494 for CVE-2022-1966", "url": "https://bugzilla.suse.com/1200494" }, { "category": "external", "summary": "SUSE Bug 1200529 for CVE-2022-1966", "url": "https://bugzilla.suse.com/1200529" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2022-1966" }, { "cve": "CVE-2022-1972", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-1972" } ], "notes": [ { "category": "general", "text": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2022-2078. Reason: This candidate is a reservation duplicate of CVE-2022-2078. Notes: All CVE users should reference CVE-2022-2078 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-1972", "url": "https://www.suse.com/security/cve/CVE-2022-1972" }, { "category": "external", "summary": "SUSE Bug 1200019 for CVE-2022-1972", "url": "https://bugzilla.suse.com/1200019" }, { "category": "external", "summary": "SUSE Bug 1200266 for CVE-2022-1972", "url": "https://bugzilla.suse.com/1200266" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2022-1972" }, { "cve": "CVE-2022-1973", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-1973" } ], "notes": [ { "category": "general", "text": "A use-after-free flaw was found in the Linux kernel in log_replay in fs/ntfs3/fslog.c in the NTFS journal. This flaw allows a local attacker to crash the system and leads to a kernel information leak problem.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-1973", "url": "https://www.suse.com/security/cve/CVE-2022-1973" }, { "category": "external", "summary": "SUSE Bug 1200023 for CVE-2022-1973", "url": "https://bugzilla.suse.com/1200023" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2022-1973" }, { "cve": "CVE-2022-22942", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-22942" } ], "notes": [ { "category": "general", "text": "The vmwgfx driver contains a local privilege escalation vulnerability that allows unprivileged users to gain access to files opened by other processes on the system through a dangling \u0027file\u0027 pointer.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-22942", "url": "https://www.suse.com/security/cve/CVE-2022-22942" }, { "category": "external", "summary": "SUSE Bug 1195065 for CVE-2022-22942", "url": "https://bugzilla.suse.com/1195065" }, { "category": "external", "summary": "SUSE Bug 1195951 for CVE-2022-22942", "url": "https://bugzilla.suse.com/1195951" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2022-22942" }, { "cve": "CVE-2022-2308", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-2308" } ], "notes": [ { "category": "general", "text": "A flaw was found in vDPA with VDUSE backend. There are currently no checks in VDUSE kernel driver to ensure the size of the device config space is in line with the features advertised by the VDUSE userspace application. In case of a mismatch, Virtio drivers config read helpers do not initialize the memory indirectly passed to vduse_vdpa_get_config() returning uninitialized memory from the stack. This could cause undefined behavior or data leaks in Virtio drivers.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-2308", "url": "https://www.suse.com/security/cve/CVE-2022-2308" }, { "category": "external", "summary": "SUSE Bug 1202573 for CVE-2022-2308", "url": "https://bugzilla.suse.com/1202573" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2022-2308" }, { "cve": "CVE-2022-24958", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-24958" } ], "notes": [ { "category": "general", "text": "drivers/usb/gadget/legacy/inode.c in the Linux kernel through 5.16.8 mishandles dev-\u003ebuf release.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-24958", "url": "https://www.suse.com/security/cve/CVE-2022-24958" }, { "category": "external", "summary": "SUSE Bug 1195905 for CVE-2022-24958", "url": "https://bugzilla.suse.com/1195905" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2022-24958" }, { "cve": "CVE-2022-2588", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-2588" } ], "notes": [ { "category": "general", "text": "It was discovered that the cls_route filter implementation in the Linux kernel would not remove an old filter from the hashtable before freeing it if its handle had the value 0.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-2588", "url": "https://www.suse.com/security/cve/CVE-2022-2588" }, { "category": "external", "summary": "SUSE Bug 1202096 for CVE-2022-2588", "url": "https://bugzilla.suse.com/1202096" }, { "category": "external", "summary": "SUSE Bug 1203613 for CVE-2022-2588", "url": "https://bugzilla.suse.com/1203613" }, { "category": "external", "summary": "SUSE Bug 1204183 for CVE-2022-2588", "url": "https://bugzilla.suse.com/1204183" }, { "category": "external", "summary": "SUSE Bug 1209225 for CVE-2022-2588", "url": "https://bugzilla.suse.com/1209225" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2022-2588" }, { "cve": "CVE-2022-2590", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-2590" } ], "notes": [ { "category": "general", "text": "A race condition was found in the way the Linux kernel\u0027s memory subsystem handled the copy-on-write (COW) breakage of private read-only shared memory mappings. This flaw allows an unprivileged, local user to gain write access to read-only memory mappings, increasing their privileges on the system.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-2590", "url": "https://www.suse.com/security/cve/CVE-2022-2590" }, { "category": "external", "summary": "SUSE Bug 1202013 for CVE-2022-2590", "url": "https://bugzilla.suse.com/1202013" }, { "category": "external", "summary": "SUSE Bug 1202089 for CVE-2022-2590", "url": "https://bugzilla.suse.com/1202089" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2022-2590" }, { "cve": "CVE-2022-26490", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-26490" } ], "notes": [ { "category": "general", "text": "st21nfca_connectivity_event_received in drivers/nfc/st21nfca/se.c in the Linux kernel through 5.16.12 has EVT_TRANSACTION buffer overflows because of untrusted length parameters.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-26490", "url": "https://www.suse.com/security/cve/CVE-2022-26490" }, { "category": "external", "summary": "SUSE Bug 1196830 for CVE-2022-26490", "url": "https://bugzilla.suse.com/1196830" }, { "category": "external", "summary": "SUSE Bug 1201656 for CVE-2022-26490", "url": "https://bugzilla.suse.com/1201656" }, { "category": "external", "summary": "SUSE Bug 1201969 for CVE-2022-26490", "url": "https://bugzilla.suse.com/1201969" }, { "category": "external", "summary": "SUSE Bug 1211495 for CVE-2022-26490", "url": "https://bugzilla.suse.com/1211495" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2022-26490" }, { "cve": "CVE-2022-28388", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-28388" } ], "notes": [ { "category": "general", "text": "usb_8dev_start_xmit in drivers/net/can/usb/usb_8dev.c in the Linux kernel through 5.17.1 has a double free.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-28388", "url": "https://www.suse.com/security/cve/CVE-2022-28388" }, { "category": "external", "summary": "SUSE Bug 1198032 for CVE-2022-28388", "url": "https://bugzilla.suse.com/1198032" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2022-28388" }, { "cve": "CVE-2022-28389", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-28389" } ], "notes": [ { "category": "general", "text": "mcba_usb_start_xmit in drivers/net/can/usb/mcba_usb.c in the Linux kernel through 5.17.1 has a double free.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-28389", "url": "https://www.suse.com/security/cve/CVE-2022-28389" }, { "category": "external", "summary": "SUSE Bug 1198033 for CVE-2022-28389", "url": "https://bugzilla.suse.com/1198033" }, { "category": "external", "summary": "SUSE Bug 1201657 for CVE-2022-28389", "url": "https://bugzilla.suse.com/1201657" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2022-28389" }, { "cve": "CVE-2022-28390", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-28390" } ], "notes": [ { "category": "general", "text": "ems_usb_start_xmit in drivers/net/can/usb/ems_usb.c in the Linux kernel through 5.17.1 has a double free.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-28390", "url": "https://www.suse.com/security/cve/CVE-2022-28390" }, { "category": "external", "summary": "SUSE Bug 1198031 for CVE-2022-28390", "url": "https://bugzilla.suse.com/1198031" }, { "category": "external", "summary": "SUSE Bug 1201517 for CVE-2022-28390", "url": "https://bugzilla.suse.com/1201517" }, { "category": "external", "summary": "SUSE Bug 1207969 for CVE-2022-28390", "url": "https://bugzilla.suse.com/1207969" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2022-28390" }, { "cve": "CVE-2022-28893", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-28893" } ], "notes": [ { "category": "general", "text": "The SUNRPC subsystem in the Linux kernel through 5.17.2 can call xs_xprt_free before ensuring that sockets are in the intended state.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-28893", "url": "https://www.suse.com/security/cve/CVE-2022-28893" }, { "category": "external", "summary": "SUSE Bug 1198330 for CVE-2022-28893", "url": "https://bugzilla.suse.com/1198330" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2022-28893" }, { "cve": "CVE-2022-29900", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-29900" } ], "notes": [ { "category": "general", "text": "Mis-trained branch predictions for return instructions may allow arbitrary speculative code execution under certain microarchitecture-dependent conditions.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-29900", "url": "https://www.suse.com/security/cve/CVE-2022-29900" }, { "category": "external", "summary": "SUSE Bug 1199657 for CVE-2022-29900", "url": "https://bugzilla.suse.com/1199657" }, { "category": "external", "summary": "SUSE Bug 1201469 for CVE-2022-29900", "url": "https://bugzilla.suse.com/1201469" }, { "category": "external", "summary": "SUSE Bug 1207894 for CVE-2022-29900", "url": "https://bugzilla.suse.com/1207894" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2022-29900" }, { "cve": "CVE-2022-29901", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-29901" } ], "notes": [ { "category": "general", "text": "Intel microprocessor generations 6 to 8 are affected by a new Spectre variant that is able to bypass their retpoline mitigation in the kernel to leak arbitrary data. An attacker with unprivileged user access can hijack return instructions to achieve arbitrary speculative code execution under certain microarchitecture-dependent conditions.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-29901", "url": "https://www.suse.com/security/cve/CVE-2022-29901" }, { "category": "external", "summary": "SUSE Bug 1201469 for CVE-2022-29901", "url": "https://bugzilla.suse.com/1201469" }, { "category": "external", "summary": "SUSE Bug 1207894 for CVE-2022-29901", "url": "https://bugzilla.suse.com/1207894" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2022-29901" }, { "cve": "CVE-2022-29968", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-29968" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel through 5.17.5. io_rw_init_file in fs/io_uring.c lacks initialization of kiocb-\u003eprivate.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-29968", "url": "https://www.suse.com/security/cve/CVE-2022-29968" }, { "category": "external", "summary": "SUSE Bug 1199087 for CVE-2022-29968", "url": "https://bugzilla.suse.com/1199087" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.3, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "low" } ], "title": "CVE-2022-29968" }, { "cve": "CVE-2022-3424", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-3424" } ], "notes": [ { "category": "general", "text": "A use-after-free flaw was found in the Linux kernel\u0027s SGI GRU driver in the way the first gru_file_unlocked_ioctl function is called by the user, where a fail pass occurs in the gru_check_chiplet_assignment function. This flaw allows a local user to crash or potentially escalate their privileges on the system.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-3424", "url": "https://www.suse.com/security/cve/CVE-2022-3424" }, { "category": "external", "summary": "SUSE Bug 1204166 for CVE-2022-3424", "url": "https://bugzilla.suse.com/1204166" }, { "category": "external", "summary": "SUSE Bug 1204167 for CVE-2022-3424", "url": "https://bugzilla.suse.com/1204167" }, { "category": "external", "summary": "SUSE Bug 1208044 for CVE-2022-3424", "url": "https://bugzilla.suse.com/1208044" }, { "category": "external", "summary": "SUSE Bug 1212309 for CVE-2022-3424", "url": "https://bugzilla.suse.com/1212309" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2022-3424" }, { "cve": "CVE-2022-34918", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-34918" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel through 5.18.9. A type confusion bug in nft_set_elem_init (leading to a buffer overflow) could be used by a local attacker to escalate privileges, a different vulnerability than CVE-2022-32250. (The attacker can obtain root access, but must start with an unprivileged user namespace to obtain CAP_NET_ADMIN access.) This can be fixed in nft_setelem_parse_data in net/netfilter/nf_tables_api.c.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-34918", "url": "https://www.suse.com/security/cve/CVE-2022-34918" }, { "category": "external", "summary": "SUSE Bug 1201171 for CVE-2022-34918", "url": "https://bugzilla.suse.com/1201171" }, { "category": "external", "summary": "SUSE Bug 1201177 for CVE-2022-34918", "url": "https://bugzilla.suse.com/1201177" }, { "category": "external", "summary": "SUSE Bug 1201222 for CVE-2022-34918", "url": "https://bugzilla.suse.com/1201222" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2022-34918" }, { "cve": "CVE-2022-3628", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-3628" } ], "notes": [ { "category": "general", "text": "A buffer overflow flaw was found in the Linux kernel Broadcom Full MAC Wi-Fi driver. This issue occurs when a user connects to a malicious USB device. This can allow a local user to crash the system or escalate their privileges.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-3628", "url": "https://www.suse.com/security/cve/CVE-2022-3628" }, { "category": "external", "summary": "SUSE Bug 1204868 for CVE-2022-3628", "url": "https://bugzilla.suse.com/1204868" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2022-3628" }, { "cve": "CVE-2022-3640", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-3640" } ], "notes": [ { "category": "general", "text": "A vulnerability, which was classified as critical, was found in Linux Kernel. Affected is the function l2cap_conn_del of the file net/bluetooth/l2cap_core.c of the component Bluetooth. The manipulation leads to use after free. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-211944.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-3640", "url": "https://www.suse.com/security/cve/CVE-2022-3640" }, { "category": "external", "summary": "SUSE Bug 1204619 for CVE-2022-3640", "url": "https://bugzilla.suse.com/1204619" }, { "category": "external", "summary": "SUSE Bug 1204624 for CVE-2022-3640", "url": "https://bugzilla.suse.com/1204624" }, { "category": "external", "summary": "SUSE Bug 1209225 for CVE-2022-3640", "url": "https://bugzilla.suse.com/1209225" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2022-3640" }, { "cve": "CVE-2022-40982", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-40982" } ], "notes": [ { "category": "general", "text": "Information exposure through microarchitectural state after transient execution in certain vector execution units for some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-40982", "url": "https://www.suse.com/security/cve/CVE-2022-40982" }, { "category": "external", "summary": "SUSE Bug 1206418 for CVE-2022-40982", "url": "https://bugzilla.suse.com/1206418" }, { "category": "external", "summary": "SUSE Bug 1215674 for CVE-2022-40982", "url": "https://bugzilla.suse.com/1215674" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2022-40982" }, { "cve": "CVE-2022-41218", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-41218" } ], "notes": [ { "category": "general", "text": "In drivers/media/dvb-core/dmxdev.c in the Linux kernel through 5.19.10, there is a use-after-free caused by refcount races, affecting dvb_demux_open and dvb_dmxdev_release.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-41218", "url": "https://www.suse.com/security/cve/CVE-2022-41218" }, { "category": "external", "summary": "SUSE Bug 1202960 for CVE-2022-41218", "url": "https://bugzilla.suse.com/1202960" }, { "category": "external", "summary": "SUSE Bug 1203606 for CVE-2022-41218", "url": "https://bugzilla.suse.com/1203606" }, { "category": "external", "summary": "SUSE Bug 1205313 for CVE-2022-41218", "url": "https://bugzilla.suse.com/1205313" }, { "category": "external", "summary": "SUSE Bug 1209225 for CVE-2022-41218", "url": "https://bugzilla.suse.com/1209225" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2022-41218" }, { "cve": "CVE-2022-41674", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-41674" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel before 5.19.16. Attackers able to inject WLAN frames could cause a buffer overflow in the ieee80211_bss_info_update function in net/mac80211/scan.c.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-41674", "url": "https://www.suse.com/security/cve/CVE-2022-41674" }, { "category": "external", "summary": "SUSE Bug 1203770 for CVE-2022-41674", "url": "https://bugzilla.suse.com/1203770" }, { "category": "external", "summary": "SUSE Bug 1203994 for CVE-2022-41674", "url": "https://bugzilla.suse.com/1203994" }, { "category": "external", "summary": "SUSE Bug 1209225 for CVE-2022-41674", "url": "https://bugzilla.suse.com/1209225" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2022-41674" }, { "cve": "CVE-2022-42719", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-42719" } ], "notes": [ { "category": "general", "text": "A use-after-free in the mac80211 stack when parsing a multi-BSSID element in the Linux kernel 5.2 through 5.19.x before 5.19.16 could be used by attackers (able to inject WLAN frames) to crash the kernel and potentially execute code.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-42719", "url": "https://www.suse.com/security/cve/CVE-2022-42719" }, { "category": "external", "summary": "SUSE Bug 1204051 for CVE-2022-42719", "url": "https://bugzilla.suse.com/1204051" }, { "category": "external", "summary": "SUSE Bug 1204292 for CVE-2022-42719", "url": "https://bugzilla.suse.com/1204292" }, { "category": "external", "summary": "SUSE Bug 1209225 for CVE-2022-42719", "url": "https://bugzilla.suse.com/1209225" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2022-42719" }, { "cve": "CVE-2022-42720", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-42720" } ], "notes": [ { "category": "general", "text": "Various refcounting bugs in the multi-BSS handling in the mac80211 stack in the Linux kernel 5.1 through 5.19.x before 5.19.16 could be used by local attackers (able to inject WLAN frames) to trigger use-after-free conditions to potentially execute code.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-42720", "url": "https://www.suse.com/security/cve/CVE-2022-42720" }, { "category": "external", "summary": "SUSE Bug 1204059 for CVE-2022-42720", "url": "https://bugzilla.suse.com/1204059" }, { "category": "external", "summary": "SUSE Bug 1204291 for CVE-2022-42720", "url": "https://bugzilla.suse.com/1204291" }, { "category": "external", "summary": "SUSE Bug 1209225 for CVE-2022-42720", "url": "https://bugzilla.suse.com/1209225" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2022-42720" }, { "cve": "CVE-2022-42721", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-42721" } ], "notes": [ { "category": "general", "text": "A list management bug in BSS handling in the mac80211 stack in the Linux kernel 5.1 through 5.19.x before 5.19.16 could be used by local attackers (able to inject WLAN frames) to corrupt a linked list and, in turn, potentially execute code.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-42721", "url": "https://www.suse.com/security/cve/CVE-2022-42721" }, { "category": "external", "summary": "SUSE Bug 1204060 for CVE-2022-42721", "url": "https://bugzilla.suse.com/1204060" }, { "category": "external", "summary": "SUSE Bug 1204290 for CVE-2022-42721", "url": "https://bugzilla.suse.com/1204290" }, { "category": "external", "summary": "SUSE Bug 1209225 for CVE-2022-42721", "url": "https://bugzilla.suse.com/1209225" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2022-42721" }, { "cve": "CVE-2022-42722", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-42722" } ], "notes": [ { "category": "general", "text": "In the Linux kernel 5.8 through 5.19.x before 5.19.16, local attackers able to inject WLAN frames into the mac80211 stack could cause a NULL pointer dereference denial-of-service attack against the beacon protection of P2P devices.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-42722", "url": "https://www.suse.com/security/cve/CVE-2022-42722" }, { "category": "external", "summary": "SUSE Bug 1204125 for CVE-2022-42722", "url": "https://bugzilla.suse.com/1204125" }, { "category": "external", "summary": "SUSE Bug 1204289 for CVE-2022-42722", "url": "https://bugzilla.suse.com/1204289" }, { "category": "external", "summary": "SUSE Bug 1209225 for CVE-2022-42722", "url": "https://bugzilla.suse.com/1209225" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2022-42722" }, { "cve": "CVE-2022-4379", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-4379" } ], "notes": [ { "category": "general", "text": "A use-after-free vulnerability was found in __nfs42_ssc_open() in fs/nfs/nfs4file.c in the Linux kernel. This flaw allows an attacker to conduct a remote denial", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-4379", "url": "https://www.suse.com/security/cve/CVE-2022-4379" }, { "category": "external", "summary": "SUSE Bug 1206209 for CVE-2022-4379", "url": "https://bugzilla.suse.com/1206209" }, { "category": "external", "summary": "SUSE Bug 1206373 for CVE-2022-4379", "url": "https://bugzilla.suse.com/1206373" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2022-4379" }, { "cve": "CVE-2022-44032", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-44032" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel through 6.0.6. drivers/char/pcmcia/cm4000_cs.c has a race condition and resultant use-after-free if a physically proximate attacker removes a PCMCIA device while calling open(), aka a race condition between cmm_open() and cm4000_detach().", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-44032", "url": "https://www.suse.com/security/cve/CVE-2022-44032" }, { "category": "external", "summary": "SUSE Bug 1204894 for CVE-2022-44032", "url": "https://bugzilla.suse.com/1204894" }, { "category": "external", "summary": "SUSE Bug 1212290 for CVE-2022-44032", "url": "https://bugzilla.suse.com/1212290" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2022-44032" }, { "cve": "CVE-2022-44033", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-44033" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel through 6.0.6. drivers/char/pcmcia/cm4040_cs.c has a race condition and resultant use-after-free if a physically proximate attacker removes a PCMCIA device while calling open(), aka a race condition between cm4040_open() and reader_detach().", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-44033", "url": "https://www.suse.com/security/cve/CVE-2022-44033" }, { "category": "external", "summary": "SUSE Bug 1204922 for CVE-2022-44033", "url": "https://bugzilla.suse.com/1204922" }, { "category": "external", "summary": "SUSE Bug 1212306 for CVE-2022-44033", "url": "https://bugzilla.suse.com/1212306" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2022-44033" }, { "cve": "CVE-2022-44034", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-44034" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel through 6.0.6. drivers/char/pcmcia/scr24x_cs.c has a race condition and resultant use-after-free if a physically proximate attacker removes a PCMCIA device while calling open(), aka a race condition between scr24x_open() and scr24x_remove().", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-44034", "url": "https://www.suse.com/security/cve/CVE-2022-44034" }, { "category": "external", "summary": "SUSE Bug 1204901 for CVE-2022-44034", "url": "https://bugzilla.suse.com/1204901" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2022-44034" }, { "cve": "CVE-2022-45884", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-45884" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel through 6.0.9. drivers/media/dvb-core/dvbdev.c has a use-after-free, related to dvb_register_device dynamically allocating fops.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-45884", "url": "https://www.suse.com/security/cve/CVE-2022-45884" }, { "category": "external", "summary": "SUSE Bug 1205756 for CVE-2022-45884", "url": "https://bugzilla.suse.com/1205756" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2022-45884" }, { "cve": "CVE-2022-45885", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-45885" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel through 6.0.9. drivers/media/dvb-core/dvb_frontend.c has a race condition that can cause a use-after-free when a device is disconnected.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-45885", "url": "https://www.suse.com/security/cve/CVE-2022-45885" }, { "category": "external", "summary": "SUSE Bug 1205758 for CVE-2022-45885", "url": "https://bugzilla.suse.com/1205758" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2022-45885" }, { "cve": "CVE-2022-45886", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-45886" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel through 6.0.9. drivers/media/dvb-core/dvb_net.c has a .disconnect versus dvb_device_open race condition that leads to a use-after-free.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-45886", "url": "https://www.suse.com/security/cve/CVE-2022-45886" }, { "category": "external", "summary": "SUSE Bug 1205760 for CVE-2022-45886", "url": "https://bugzilla.suse.com/1205760" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2022-45886" }, { "cve": "CVE-2022-45887", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-45887" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel through 6.0.9. drivers/media/usb/ttusb-dec/ttusb_dec.c has a memory leak because of the lack of a dvb_frontend_detach call.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-45887", "url": "https://www.suse.com/security/cve/CVE-2022-45887" }, { "category": "external", "summary": "SUSE Bug 1205762 for CVE-2022-45887", "url": "https://bugzilla.suse.com/1205762" }, { "category": "external", "summary": "SUSE Bug 1220015 for CVE-2022-45887", "url": "https://bugzilla.suse.com/1220015" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2022-45887" }, { "cve": "CVE-2022-45888", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-45888" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel through 6.0.9. drivers/char/xillybus/xillyusb.c has a race condition and use-after-free during physical removal of a USB device.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-45888", "url": "https://www.suse.com/security/cve/CVE-2022-45888" }, { "category": "external", "summary": "SUSE Bug 1205764 for CVE-2022-45888", "url": "https://bugzilla.suse.com/1205764" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "low" } ], "title": "CVE-2022-45888" }, { "cve": "CVE-2022-45919", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-45919" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel through 6.0.10. In drivers/media/dvb-core/dvb_ca_en50221.c, a use-after-free can occur is there is a disconnect after an open, because of the lack of a wait_event.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-45919", "url": "https://www.suse.com/security/cve/CVE-2022-45919" }, { "category": "external", "summary": "SUSE Bug 1205803 for CVE-2022-45919", "url": "https://bugzilla.suse.com/1205803" }, { "category": "external", "summary": "SUSE Bug 1208912 for CVE-2022-45919", "url": "https://bugzilla.suse.com/1208912" }, { "category": "external", "summary": "SUSE Bug 1214128 for CVE-2022-45919", "url": "https://bugzilla.suse.com/1214128" }, { "category": "external", "summary": "SUSE Bug 1215674 for CVE-2022-45919", "url": "https://bugzilla.suse.com/1215674" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2022-45919" }, { "cve": "CVE-2022-45934", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-45934" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel through 6.0.10. l2cap_config_req in net/bluetooth/l2cap_core.c has an integer wraparound via L2CAP_CONF_REQ packets.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-45934", "url": "https://www.suse.com/security/cve/CVE-2022-45934" }, { "category": "external", "summary": "SUSE Bug 1205796 for CVE-2022-45934", "url": "https://bugzilla.suse.com/1205796" }, { "category": "external", "summary": "SUSE Bug 1212292 for CVE-2022-45934", "url": "https://bugzilla.suse.com/1212292" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2022-45934" }, { "cve": "CVE-2023-0045", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-0045" } ], "notes": [ { "category": "general", "text": "The current implementation of the prctl syscall does not issue an IBPB immediately during the syscall. The ib_prctl_set function updates the Thread Information Flags (TIFs) for the task and updates the SPEC_CTRL MSR on the function __speculation_ctrl_update, but the IBPB is only issued on the next schedule, when the TIF bits are checked. This leaves the victim vulnerable to values already injected on the BTB, prior to the prctl syscall. The patch that added the support for the conditional mitigation via prctl (ib_prctl_set) dates back to the kernel 4.9.176.\n\nWe recommend upgrading past commit a664ec9158eeddd75121d39c9a0758016097fa96\n\n", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-0045", "url": "https://www.suse.com/security/cve/CVE-2023-0045" }, { "category": "external", "summary": "SUSE Bug 1207773 for CVE-2023-0045", "url": "https://bugzilla.suse.com/1207773" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2023-0045" }, { "cve": "CVE-2023-1076", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-1076" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux Kernel. The tun/tap sockets have their socket UID hardcoded to 0 due to a type confusion in their initialization function. While it will be often correct, as tuntap devices require CAP_NET_ADMIN, it may not always be the case, e.g., a non-root user only having that capability. This would make tun/tap sockets being incorrectly treated in filtering/routing decisions, possibly bypassing network filters.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-1076", "url": "https://www.suse.com/security/cve/CVE-2023-1076" }, { "category": "external", "summary": "SUSE Bug 1208599 for CVE-2023-1076", "url": "https://bugzilla.suse.com/1208599" }, { "category": "external", "summary": "SUSE Bug 1214019 for CVE-2023-1076", "url": "https://bugzilla.suse.com/1214019" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2023-1076" }, { "cve": "CVE-2023-1078", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-1078" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux Kernel in RDS (Reliable Datagram Sockets) protocol. The rds_rm_zerocopy_callback() uses list_entry() on the head of a list causing a type confusion. Local user can trigger this with rds_message_put(). Type confusion leads to `struct rds_msg_zcopy_info *info` actually points to something else that is potentially controlled by local user. It is known how to trigger this, which causes an out of bounds access, and a lock corruption.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-1078", "url": "https://www.suse.com/security/cve/CVE-2023-1078" }, { "category": "external", "summary": "SUSE Bug 1208601 for CVE-2023-1078", "url": "https://bugzilla.suse.com/1208601" }, { "category": "external", "summary": "SUSE Bug 1208603 for CVE-2023-1078", "url": "https://bugzilla.suse.com/1208603" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2023-1078" }, { "cve": "CVE-2023-1192", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-1192" } ], "notes": [ { "category": "general", "text": "A use-after-free flaw was found in smb2_is_status_io_timeout() in CIFS in the Linux Kernel. After CIFS transfers response data to a system call, there are still local variable points to the memory region, and if the system call frees it faster than CIFS uses it, CIFS will access a free memory region, leading to a denial of service.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-1192", "url": "https://www.suse.com/security/cve/CVE-2023-1192" }, { "category": "external", "summary": "SUSE Bug 1208995 for CVE-2023-1192", "url": "https://bugzilla.suse.com/1208995" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2023-1192" }, { "cve": "CVE-2023-1380", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-1380" } ], "notes": [ { "category": "general", "text": "A slab-out-of-bound read problem was found in brcmf_get_assoc_ies in drivers/net/wireless/broadcom/brcm80211/brcmfmac/cfg80211.c in the Linux Kernel. This issue could occur when assoc_info-\u003ereq_len data is bigger than the size of the buffer, defined as WL_EXTRA_BUF_MAX, leading to a denial of service.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-1380", "url": "https://www.suse.com/security/cve/CVE-2023-1380" }, { "category": "external", "summary": "SUSE Bug 1209287 for CVE-2023-1380", "url": "https://bugzilla.suse.com/1209287" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.3, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "low" } ], "title": "CVE-2023-1380" }, { "cve": "CVE-2023-20569", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-20569" } ], "notes": [ { "category": "general", "text": "\n\n\nA side channel vulnerability on some of the AMD CPUs may allow an attacker to influence the return address prediction. This may result in speculative execution at an attacker-controlled\u202faddress, potentially leading to information disclosure.\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-20569", "url": "https://www.suse.com/security/cve/CVE-2023-20569" }, { "category": "external", "summary": "SUSE Bug 1213287 for CVE-2023-20569", "url": "https://bugzilla.suse.com/1213287" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2023-20569" }, { "cve": "CVE-2023-20593", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-20593" } ], "notes": [ { "category": "general", "text": "\nAn issue in \"Zen 2\" CPUs, under specific microarchitectural circumstances, may allow an attacker to potentially access sensitive information.\n\n\n\n\n\n\n", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-20593", "url": "https://www.suse.com/security/cve/CVE-2023-20593" }, { "category": "external", "summary": "SUSE Bug 1213286 for CVE-2023-20593", "url": "https://bugzilla.suse.com/1213286" }, { "category": "external", "summary": "SUSE Bug 1213616 for CVE-2023-20593", "url": "https://bugzilla.suse.com/1213616" }, { "category": "external", "summary": "SUSE Bug 1215674 for CVE-2023-20593", "url": "https://bugzilla.suse.com/1215674" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2023-20593" }, { "cve": "CVE-2023-2124", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-2124" } ], "notes": [ { "category": "general", "text": "An out-of-bounds memory access flaw was found in the Linux kernel\u0027s XFS file system in how a user restores an XFS image after failure (with a dirty log journal). This flaw allows a local user to crash or potentially escalate their privileges on the system.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-2124", "url": "https://www.suse.com/security/cve/CVE-2023-2124" }, { "category": "external", "summary": "SUSE Bug 1210498 for CVE-2023-2124", "url": "https://bugzilla.suse.com/1210498" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2023-2124" }, { "cve": "CVE-2023-31084", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-31084" } ], "notes": [ { "category": "general", "text": "An issue was discovered in drivers/media/dvb-core/dvb_frontend.c in the Linux kernel 6.2. There is a blocking operation when a task is in !TASK_RUNNING. In dvb_frontend_get_event, wait_event_interruptible is called; the condition is dvb_frontend_test_event(fepriv,events). In dvb_frontend_test_event, down(\u0026fepriv-\u003esem) is called. However, wait_event_interruptible would put the process to sleep, and down(\u0026fepriv-\u003esem) may block the process.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-31084", "url": "https://www.suse.com/security/cve/CVE-2023-31084" }, { "category": "external", "summary": "SUSE Bug 1210783 for CVE-2023-31084", "url": "https://bugzilla.suse.com/1210783" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2023-31084" }, { "cve": "CVE-2023-3141", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-3141" } ], "notes": [ { "category": "general", "text": "A use-after-free flaw was found in r592_remove in drivers/memstick/host/r592.c in media access in the Linux Kernel. This flaw allows a local attacker to crash the system at device disconnect, possibly leading to a kernel information leak.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-3141", "url": "https://www.suse.com/security/cve/CVE-2023-3141" }, { "category": "external", "summary": "SUSE Bug 1212129 for CVE-2023-3141", "url": "https://bugzilla.suse.com/1212129" }, { "category": "external", "summary": "SUSE Bug 1215674 for CVE-2023-3141", "url": "https://bugzilla.suse.com/1215674" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2023-3141" }, { "cve": "CVE-2023-3269", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-3269" } ], "notes": [ { "category": "general", "text": "A vulnerability exists in the memory management subsystem of the Linux kernel. The lock handling for accessing and updating virtual memory areas (VMAs) is incorrect, leading to use-after-free problems. This issue can be successfully exploited to execute arbitrary kernel code, escalate containers, and gain root privileges.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-3269", "url": "https://www.suse.com/security/cve/CVE-2023-3269" }, { "category": "external", "summary": "SUSE Bug 1212395 for CVE-2023-3269", "url": "https://bugzilla.suse.com/1212395" }, { "category": "external", "summary": "SUSE Bug 1213760 for CVE-2023-3269", "url": "https://bugzilla.suse.com/1213760" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2023-3269" }, { "cve": "CVE-2023-39192", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-39192" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Netfilter subsystem in the Linux kernel. The xt_u32 module did not validate the fields in the xt_u32 structure. This flaw allows a local privileged attacker to trigger an out-of-bounds read by setting the size fields with a value beyond the array boundaries, leading to a crash or information disclosure.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-39192", "url": "https://www.suse.com/security/cve/CVE-2023-39192" }, { "category": "external", "summary": "SUSE Bug 1215858 for CVE-2023-39192", "url": "https://bugzilla.suse.com/1215858" }, { "category": "external", "summary": "SUSE Bug 1220015 for CVE-2023-39192", "url": "https://bugzilla.suse.com/1220015" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2023-39192" }, { "cve": "CVE-2023-39193", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-39193" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Netfilter subsystem in the Linux kernel. The sctp_mt_check did not validate the flag_count field. This flaw allows a local privileged (CAP_NET_ADMIN) attacker to trigger an out-of-bounds read, leading to a crash or information disclosure.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-39193", "url": "https://www.suse.com/security/cve/CVE-2023-39193" }, { "category": "external", "summary": "SUSE Bug 1215860 for CVE-2023-39193", "url": "https://bugzilla.suse.com/1215860" }, { "category": "external", "summary": "SUSE Bug 1220015 for CVE-2023-39193", "url": "https://bugzilla.suse.com/1220015" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:L", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2023-39193" }, { "cve": "CVE-2023-4128", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-4128" } ], "notes": [ { "category": "general", "text": "** REJECT ** DO NOT USE THIS CVE RECORD. ConsultIDs: CVE-2023-4206, CVE-2023-4207, CVE-2023-4208. Reason: This record is a duplicate of CVE-2023-4206, CVE-2023-4207, CVE-2023-4208. Notes: All CVE users should reference CVE-2023-4206, CVE-2023-4207, CVE-2023-4208 instead of this record. All references and descriptions in this record have been removed to prevent accidental usage.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-4128", "url": "https://www.suse.com/security/cve/CVE-2023-4128" }, { "category": "external", "summary": "SUSE Bug 1214149 for CVE-2023-4128", "url": "https://bugzilla.suse.com/1214149" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2023-4128" }, { "cve": "CVE-2023-4134", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-4134" } ], "notes": [ { "category": "general", "text": "A use-after-free vulnerability was found in the cyttsp4_core driver in the Linux kernel. This issue occurs in the device cleanup routine due to a possible rearming of the watchdog_timer from the workqueue. This could allow a local user to crash the system, causing a denial of service.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-4134", "url": "https://www.suse.com/security/cve/CVE-2023-4134" }, { "category": "external", "summary": "SUSE Bug 1213971 for CVE-2023-4134", "url": "https://bugzilla.suse.com/1213971" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2023-4134" }, { "cve": "CVE-2023-4194", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-4194" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel\u0027s TUN/TAP functionality. This issue could allow a local user to bypass network filters and gain unauthorized access to some resources. The original patches fixing CVE-2023-1076 are incorrect or incomplete. The problem is that the following upstream commits - a096ccca6e50 (\"tun: tun_chr_open(): correctly initialize socket uid\"), - 66b2c338adce (\"tap: tap_open(): correctly initialize socket uid\"), pass \"inode-\u003ei_uid\" to sock_init_data_uid() as the last parameter and that turns out to not be accurate.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-4194", "url": "https://www.suse.com/security/cve/CVE-2023-4194" }, { "category": "external", "summary": "SUSE Bug 1214019 for CVE-2023-4194", "url": "https://bugzilla.suse.com/1214019" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2023-4194" }, { "cve": "CVE-2023-42753", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-42753" } ], "notes": [ { "category": "general", "text": "An array indexing vulnerability was found in the netfilter subsystem of the Linux kernel. A missing macro could lead to a miscalculation of the `h-\u003enets` array offset, providing attackers with the primitive to arbitrarily increment/decrement a memory buffer out-of-bound. This issue may allow a local user to crash the system or potentially escalate their privileges on the system.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-42753", "url": "https://www.suse.com/security/cve/CVE-2023-42753" }, { "category": "external", "summary": "SUSE Bug 1215150 for CVE-2023-42753", "url": "https://bugzilla.suse.com/1215150" }, { "category": "external", "summary": "SUSE Bug 1218613 for CVE-2023-42753", "url": "https://bugzilla.suse.com/1218613" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2023-42753" }, { "cve": "CVE-2023-42754", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-42754" } ], "notes": [ { "category": "general", "text": "A NULL pointer dereference flaw was found in the Linux kernel ipv4 stack. The socket buffer (skb) was assumed to be associated with a device before calling __ip_options_compile, which is not always the case if the skb is re-routed by ipvs. This issue may allow a local user with CAP_NET_ADMIN privileges to crash the system.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-42754", "url": "https://www.suse.com/security/cve/CVE-2023-42754" }, { "category": "external", "summary": "SUSE Bug 1215467 for CVE-2023-42754", "url": "https://bugzilla.suse.com/1215467" }, { "category": "external", "summary": "SUSE Bug 1222212 for CVE-2023-42754", "url": "https://bugzilla.suse.com/1222212" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2023-42754" }, { "cve": "CVE-2023-42756", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-42756" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Netfilter subsystem of the Linux kernel. A race condition between IPSET_CMD_ADD and IPSET_CMD_SWAP can lead to a kernel panic due to the invocation of `__ip_set_put` on a wrong `set`. This issue may allow a local user to crash the system.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-42756", "url": "https://www.suse.com/security/cve/CVE-2023-42756" }, { "category": "external", "summary": "SUSE Bug 1215767 for CVE-2023-42756", "url": "https://bugzilla.suse.com/1215767" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2023-42756" }, { "cve": "CVE-2023-4623", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-4623" } ], "notes": [ { "category": "general", "text": "A use-after-free vulnerability in the Linux kernel\u0027s net/sched: sch_hfsc (HFSC qdisc traffic control) component can be exploited to achieve local privilege escalation.\n\nIf a class with a link-sharing curve (i.e. with the HFSC_FSC flag set) has a parent without a link-sharing curve, then init_vf() will call vttree_insert() on the parent, but vttree_remove() will be skipped in update_vf(). This leaves a dangling pointer that can cause a use-after-free.\n\nWe recommend upgrading past commit b3d26c5702c7d6c45456326e56d2ccf3f103e60f.\n\n", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-4623", "url": "https://www.suse.com/security/cve/CVE-2023-4623" }, { "category": "external", "summary": "SUSE Bug 1215115 for CVE-2023-4623", "url": "https://bugzilla.suse.com/1215115" }, { "category": "external", "summary": "SUSE Bug 1215440 for CVE-2023-4623", "url": "https://bugzilla.suse.com/1215440" }, { "category": "external", "summary": "SUSE Bug 1217444 for CVE-2023-4623", "url": "https://bugzilla.suse.com/1217444" }, { "category": "external", "summary": "SUSE Bug 1217531 for CVE-2023-4623", "url": "https://bugzilla.suse.com/1217531" }, { "category": "external", "summary": "SUSE Bug 1219698 for CVE-2023-4623", "url": "https://bugzilla.suse.com/1219698" }, { "category": "external", "summary": "SUSE Bug 1221578 for CVE-2023-4623", "url": "https://bugzilla.suse.com/1221578" }, { "category": "external", "summary": "SUSE Bug 1221598 for CVE-2023-4623", "url": "https://bugzilla.suse.com/1221598" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2023-4623" }, { "cve": "CVE-2023-46813", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-46813" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel before 6.5.9, exploitable by local users with userspace access to MMIO registers. Incorrect access checking in the #VC handler and instruction emulation of the SEV-ES emulation of MMIO accesses could lead to arbitrary write access to kernel memory (and thus privilege escalation). This depends on a race condition through which userspace can replace an instruction before the #VC handler reads it.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-46813", "url": "https://www.suse.com/security/cve/CVE-2023-46813" }, { "category": "external", "summary": "SUSE Bug 1212649 for CVE-2023-46813", "url": "https://bugzilla.suse.com/1212649" }, { "category": "external", "summary": "SUSE Bug 1216896 for CVE-2023-46813", "url": "https://bugzilla.suse.com/1216896" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2023-46813" }, { "cve": "CVE-2023-4881", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-4881" } ], "notes": [ { "category": "general", "text": "** REJECT ** CVE-2023-4881 was wrongly assigned to a bug that was deemed to be a non-security issue by the Linux kernel security team.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-4881", "url": "https://www.suse.com/security/cve/CVE-2023-4881" }, { "category": "external", "summary": "SUSE Bug 1215221 for CVE-2023-4881", "url": "https://bugzilla.suse.com/1215221" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:L", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2023-4881" }, { "cve": "CVE-2023-5345", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-5345" } ], "notes": [ { "category": "general", "text": "A use-after-free vulnerability in the Linux kernel\u0027s fs/smb/client component can be exploited to achieve local privilege escalation.\n\nIn case of an error in smb3_fs_context_parse_param, ctx-\u003epassword was freed but the field was not set to NULL which could lead to double free.\n\nWe recommend upgrading past commit e6e43b8aa7cd3c3af686caf0c2e11819a886d705.\n\n", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-5345", "url": "https://www.suse.com/security/cve/CVE-2023-5345" }, { "category": "external", "summary": "SUSE Bug 1215899 for CVE-2023-5345", "url": "https://bugzilla.suse.com/1215899" }, { "category": "external", "summary": "SUSE Bug 1215971 for CVE-2023-5345", "url": "https://bugzilla.suse.com/1215971" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2023-5345" }, { "cve": "CVE-2023-6606", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-6606" } ], "notes": [ { "category": "general", "text": "An out-of-bounds read vulnerability was found in smbCalcSize in fs/smb/client/netmisc.c in the Linux Kernel. This issue could allow a local attacker to crash the system or leak internal kernel information.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-6606", "url": "https://www.suse.com/security/cve/CVE-2023-6606" }, { "category": "external", "summary": "SUSE Bug 1217947 for CVE-2023-6606", "url": "https://bugzilla.suse.com/1217947" }, { "category": "external", "summary": "SUSE Bug 1220015 for CVE-2023-6606", "url": "https://bugzilla.suse.com/1220015" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2023-6606" }, { "cve": "CVE-2023-6610", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-6610" } ], "notes": [ { "category": "general", "text": "An out-of-bounds read vulnerability was found in smb2_dump_detail in fs/smb/client/smb2ops.c in the Linux Kernel. This issue could allow a local attacker to crash the system or leak internal kernel information.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-6610", "url": "https://www.suse.com/security/cve/CVE-2023-6610" }, { "category": "external", "summary": "SUSE Bug 1217946 for CVE-2023-6610", "url": "https://bugzilla.suse.com/1217946" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2023-6610" } ] }
opensuse-su-2019:2392-1
Vulnerability from csaf_opensuse
Published
2019-10-27 18:35
Modified
2019-10-27 18:35
Summary
Security update for the Linux Kernel
Notes
Title of the patch
Security update for the Linux Kernel
Description of the patch
The openSUSE Leap 15.0 kernel was updated to receive various security and bugfixes.
The following security bugs were fixed:
- CVE-2019-17666: rtl_p2p_noa_ie in drivers/net/wireless/realtek/rtlwifi/ps.c lacked a certain upper-bound check, leading to a buffer overflow (bnc#1154372).
- CVE-2019-16232: drivers/net/wireless/marvell/libertas/if_sdio.c did not check the alloc_workqueue return value, leading to a NULL pointer dereference (bnc#1150465).
- CVE-2019-16234: drivers/net/wireless/intel/iwlwifi/pcie/trans.c did not check the alloc_workqueue return value, leading to a NULL pointer dereference (bnc#1150452).
- CVE-2019-17133: cfg80211_mgd_wext_giwessid in net/wireless/wext-sme.c did not reject a long SSID IE, leading to a Buffer Overflow (bnc#1153158).
- CVE-2019-17056: llcp_sock_create in net/nfc/llcp_sock.c in the AF_NFC network module did not enforce CAP_NET_RAW, which means that unprivileged users can create a raw socket, aka CID-3a359798b176 (bnc#1152788).
The following non-security bugs were fixed:
- 9p: avoid attaching writeback_fid on mmap with type PRIVATE (bsc#1051510).
- ACPI / CPPC: do not require the _PSD method (bsc#1051510).
- ACPI: CPPC: Set pcc_data[pcc_ss_id] to NULL in acpi_cppc_processor_exit() (bsc#1051510).
- ACPI / processor: do not print errors for processorIDs == 0xff (bsc#1051510).
- act_mirred: Fix mirred_init_module error handling (bsc#1051510).
- Add kernel module compression support (bsc#1135854)
For enabling the kernel module compress, add the item COMPRESS_MODULES='xz' in config.sh, then mkspec will pass it to the spec file.
- ALSA: hda - Add laptop imic fixup for ASUS M9V laptop (bsc#1051510).
- ALSA: hda: Add support of Zhaoxin controller (bsc#1051510).
- ALSA: hda - Apply AMD controller workaround for Raven platform (bsc#1051510).
- ALSA: hda - Define a fallback_pin_fixup_tbl for alc269 family (bsc#1051510).
- ALSA: hda - Drop unsol event handler for Intel HDMI codecs (bsc#1051510).
- ALSA: hda - Expand pin_match function to match upcoming new tbls (bsc#1051510).
- ALSA: hda: Flush interrupts on disabling (bsc#1051510).
- ALSA: hda/hdmi: remove redundant assignment to variable pcm_idx (bsc#1051510).
- ALSA: hda - Inform too slow responses (bsc#1051510).
- ALSA: hda/realtek - Blacklist PC beep for Lenovo ThinkCentre M73/93 (bsc#1051510).
- ALSA: hda/realtek - Check beep whitelist before assigning in all codecs (bsc#1051510).
- ALSA: hda/realtek - Fix alienware headset mic (bsc#1051510).
- ALSA: hda/realtek: Reduce the Headphone static noise on XPS 9350/9360 (bsc#1051510).
- ALSA: hda: Set fifo_size for both playback and capture streams (bsc#1051510).
- ALSA: hda - Show the fatal CORB/RIRB error more clearly (bsc#1051510).
- ALSA: hda/sigmatel - remove unused variable 'stac9200_core_init' (bsc#1051510).
- ALSA: i2c: ak4xxx-adda: Fix a possible null pointer dereference in build_adc_controls() (bsc#1051510).
- ALSA: line6: sizeof (byte) is always 1, use that fact (bsc#1051510).
- ALSA: usb-audio: Add Pioneer DDJ-SX3 PCM quirck (bsc#1051510).
- ALSA: usb-audio: Disable quirks for BOSS Katana amplifiers (bsc#1051510).
- ALSA: usb-audio: Skip bSynchAddress endpoint check if it is invalid (bsc#1051510).
- appletalk: enforce CAP_NET_RAW for raw sockets (bsc#1051510).
- ASoC: Define a set of DAPM pre/post-up events (bsc#1051510).
- ASoC: dmaengine: Make the pcm->name equal to pcm->id if the name is not set (bsc#1051510).
- ASoC: Intel: Fix use of potentially uninitialized variable (bsc#1051510).
- ASoC: Intel: NHLT: Fix debug print format (bsc#1051510).
- ASoC: sgtl5000: Fix charge pump source assignment (bsc#1051510).
- auxdisplay: panel: need to delete scan_timer when misc_register fails in panel_attach (bsc#1051510).
- ax25: enforce CAP_NET_RAW for raw sockets (bsc#1051510).
- blacklist 'signal: Correct namespace fixups of si_pid and si_uid' (bsc#1142667)
- blk-wbt: abstract out end IO completion handler (bsc#1135873).
- blk-wbt: fix has-sleeper queueing check (bsc#1135873).
- blk-wbt: improve waking of tasks (bsc#1135873).
- blk-wbt: move disable check into get_limit() (bsc#1135873).
- blk-wbt: use wq_has_sleeper() for wq active check (bsc#1135873).
- block: add io timeout to sysfs (bsc#1148410).
- block: do not show io_timeout if driver has no timeout handler (bsc#1148410).
- bluetooth: btrtl: Additional Realtek 8822CE Bluetooth devices (bsc#1051510).
- bnx2x: Fix VF's VLAN reconfiguration in reload (bsc#1086323 ).
- bridge/mdb: remove wrong use of NLM_F_MULTI (networking-stable-19_09_15).
- btrfs: bail out gracefully rather than BUG_ON (bsc#1153646).
- btrfs: check for the full sync flag while holding the inode lock during fsync (bsc#1153713).
- btrfs: Ensure btrfs_init_dev_replace_tgtdev sees up to date values (bsc#1154651).
- btrfs: Ensure replaced device does not have pending chunk allocation (bsc#1154607).
- btrfs: remove wrong use of volume_mutex from btrfs_dev_replace_start (bsc#1154651).
- can: mcp251x: mcp251x_hw_reset(): allow more time after a reset (bsc#1051510).
- can: xilinx_can: xcan_probe(): skip error message on deferred probe (bsc#1051510).
- cdc_ether: fix rndis support for Mediatek based smartphones (networking-stable-19_09_15).
- cdc_ncm: fix divide-by-zero caused by invalid wMaxPacketSize (bsc#1051510).
- ceph: fix directories inode i_blkbits initialization (bsc#1153717).
- ceph: reconnect connection if session hang in opening state (bsc#1153718).
- ceph: update the mtime when truncating up (bsc#1153719).
- cfg80211: add and use strongly typed element iteration macros (bsc#1051510).
- cfg80211: Purge frame registrations on iftype change (bsc#1051510).
- clk: at91: select parent if main oscillator or bypass is enabled (bsc#1051510).
- clk: qoriq: Fix -Wunused-const-variable (bsc#1051510).
- clk: sirf: Do not reference clk_init_data after registration (bsc#1051510).
- clk: zx296718: Do not reference clk_init_data after registration (bsc#1051510).
- crypto: talitos - fix missing break in switch statement (bsc#1142635).
- cxgb4: fix endianness for vlan value in cxgb4_tc_flower (bsc#1064802 bsc#1066129).
- cxgb4: offload VLAN flows regardless of VLAN ethtype (bsc#1064802 bsc#1066129).
- cxgb4: reduce kernel stack usage in cudbg_collect_mem_region() (bsc#1073513).
- cxgb4: Signedness bug in init_one() (bsc#1097585 bsc#1097586 bsc#1097587 bsc#1097588 bsc#1097583 bsc#1097584).
- cxgb4: smt: Add lock for atomic_dec_and_test (bsc#1064802 bsc#1066129).
- dasd_fba: Display '00000000' for zero page when dumping sense
- /dev/mem: Bail out upon SIGKILL (git-fixes).
- drm/amdgpu: Check for valid number of registers to read (bsc#1051510).
- drm/amdgpu/si: fix ASIC tests (git-fixes).
- drm/amd/powerplay/smu7: enforce minimal VBITimeout (v2) (bsc#1051510).
- drm/ast: Fixed reboot test may cause system hanged (bsc#1051510).
- drm/bridge: tc358767: Increase AUX transfer length limit (bsc#1051510).
- drm: Flush output polling on shutdown (bsc#1051510).
- drm/msm/dsi: Implement reset correctly (bsc#1051510).
- drm/panel: simple: fix AUO g185han01 horizontal blanking (bsc#1051510).
- drm/radeon: Fix EEH during kexec (bsc#1051510).
- drm/tilcdc: Register cpufreq notifier after we have initialized crtc (bsc#1051510).
- drm/vmwgfx: Fix double free in vmw_recv_msg() (bsc#1051510).
- e1000e: add workaround for possible stalled packet (bsc#1051510).
- firmware: dmi: Fix unlikely out-of-bounds read in save_mem_devices (git-fixes).
- Fix AMD IOMMU kABI (bsc#1154610).
- Fix KVM kABI after x86 mmu backports (bsc#1117665).
- gpu: drm: radeon: Fix a possible null-pointer dereference in radeon_connector_set_property() (bsc#1051510).
- HID: apple: Fix stuck function keys when using FN (bsc#1051510).
- HID: hidraw: Fix invalid read in hidraw_ioctl (bsc#1051510).
- HID: logitech: Fix general protection fault caused by Logitech driver (bsc#1051510).
- HID: prodikeys: Fix general protection fault during probe (bsc#1051510).
- HID: sony: Fix memory corruption issue on cleanup (bsc#1051510).
- hwmon: (acpi_power_meter) Change log level for 'unsafe software power cap' (bsc#1051510).
- hwrng: core - do not wait on add_early_randomness() (git-fixes).
- i2c: riic: Clear NACK in tend isr (bsc#1051510).
- IB/core, ipoib: Do not overreact to SM LID change event (bsc#1154108)
- IB/hfi1: Remove overly conservative VM_EXEC flag check (bsc#1144449).
- IB/mlx5: Consolidate use_umr checks into single function (bsc#1093205).
- IB/mlx5: Fix MR re-registration flow to use UMR properly (bsc#1093205).
- IB/mlx5: Report correctly tag matching rendezvous capability (bsc#1046305).
- ieee802154: atusb: fix use-after-free at disconnect (bsc#1051510).
- ieee802154: enforce CAP_NET_RAW for raw sockets (bsc#1051510).
- iio: adc: ad799x: fix probe error handling (bsc#1051510).
- iio: light: opt3001: fix mutex unlock race (bsc#1051510).
- ima: always return negative code for error (bsc#1051510).
- Input: da9063 - fix capability and drop KEY_SLEEP (bsc#1051510).
- iommu/amd: Apply the same IVRS IOAPIC workaround to Acer Aspire A315-41 (bsc#1137799).
- iommu/amd: Check PM_LEVEL_SIZE() condition in locked section (bsc#1154608).
- iommu/amd: Override wrong IVRS IOAPIC on Raven Ridge systems (bsc#1137799).
- iommu/amd: Remove domain->updated (bsc#1154610).
- iommu/amd: Wait for completion of IOTLB flush in attach_device (bsc#1154611).
- ipmi_si: Only schedule continuously in the thread in maintenance mode (bsc#1051510).
- ipv6: Fix the link time qualifier of 'ping_v6_proc_exit_net()' (networking-stable-19_09_15).
- ixgbe: Prevent u8 wrapping of ITR value to something less than 10us (bsc#1101674).
- ixgbe: sync the first fragment unconditionally (bsc#1133140).
- kabi: net: sched: act_sample: fix psample group handling on overwrite (networking-stable-19_09_05).
- kabi/severities: Whitelist functions internal to radix mm. To call these functions you have to first detect if you are running in radix mm mode which can't be expected of OOT code.
- kABI workaround for snd_hda_pick_pin_fixup() changes (bsc#1051510).
- kernel-binary: Drop .kernel-binary.spec.buildenv (boo#1154578).
- kernel-binary.spec.in: Fix build of non-modular kernels (boo#1154578).
- kernel-subpackage-build: create zero size ghost for uncompressed vmlinux (bsc#1154354). It is not strictly necessary to uncompress it so maybe the ghost file can be 0 size in this case.
- kernel/sysctl.c: do not override max_threads provided by userspace (bnc#1150875).
- kvm: Convert kvm_lock to a mutex (bsc#1117665).
- kvm: MMU: drop vcpu param in gpte_access (bsc#1117665).
- kvm: PPC: Book3S HV: use smp_mb() when setting/clearing host_ipi flag (bsc#1061840).
- kvm: x86: add tracepoints around __direct_map and FNAME(fetch) (bsc#1117665).
- kvm: x86: adjust kvm_mmu_page member to save 8 bytes (bsc#1117665).
- kvm: x86: change kvm_mmu_page_get_gfn BUG_ON to WARN_ON (bsc#1117665).
- kvm: x86: Do not release the page inside mmu_set_spte() (bsc#1117665).
- kvm: x86: make FNAME(fetch) and __direct_map more similar (bsc#1117665).
- kvm: x86, powerpc: do not allow clearing largepages debugfs entry (bsc#1117665).
- kvm: x86: remove now unneeded hugepage gfn adjustment (bsc#1117665).
- libertas: Add missing sentinel at end of if_usb.c fw_table (bsc#1051510).
- lib/mpi: Fix karactx leak in mpi_powm (bsc#1051510).
- mac80211: accept deauth frames in IBSS mode (bsc#1051510).
- macsec: drop skb sk before calling gro_cells_receive (bsc#1051510).
- media: atmel: atmel-isc: fix asd memory allocation (bsc#1135642).
- media: cpia2_usb: fix memory leaks (bsc#1051510).
- media: dvb-core: fix a memory leak bug (bsc#1051510).
- media: exynos4-is: fix leaked of_node references (bsc#1051510).
- media: gspca: zero usb_buf on error (bsc#1051510).
- media: hdpvr: Add device num check and handling (bsc#1051510).
- media: hdpvr: add terminating 0 at end of string (bsc#1051510).
- media: i2c: ov5645: Fix power sequence (bsc#1051510).
- media: iguanair: add sanity checks (bsc#1051510).
- media: omap3isp: Do not set streaming state on random subdevs (bsc#1051510).
- media: omap3isp: Set device on omap3isp subdevs (bsc#1051510).
- media: ov9650: add a sanity check (bsc#1051510).
- media: radio/si470x: kill urb on error (bsc#1051510).
- media: saa7134: fix terminology around saa7134_i2c_eeprom_md7134_gate() (bsc#1051510).
- media: saa7146: add cleanup in hexium_attach() (bsc#1051510).
- media: sn9c20x: Add MSI MS-1039 laptop to flip_dmi_table (bsc#1051510).
- media: stkwebcam: fix runtime PM after driver unbind (bsc#1051510).
- media: ttusb-dec: Fix info-leak in ttusb_dec_send_command() (bsc#1051510).
- memstick: jmb38x_ms: Fix an error handling path in 'jmb38x_ms_probe()' (bsc#1051510).
- mfd: intel-lpss: Remove D3cold delay (bsc#1051510).
- mISDN: enforce CAP_NET_RAW for raw sockets (bsc#1051510).
- mld: fix memory leak in mld_del_delrec() (networking-stable-19_09_05).
- mmc: sdhci: Fix incorrect switch to HS mode (bsc#1051510).
- mmc: sdhci: improve ADMA error reporting (bsc#1051510).
- mmc: sdhci-of-esdhc: set DMA snooping based on DMA coherence (bsc#1051510).
- net: Fix null de-reference of device refcount (networking-stable-19_09_15).
- net: fix skb use after free in netpoll (networking-stable-19_09_05).
- net: gso: Fix skb_segment splat when splitting gso_size mangled skb having linear-headed frag_list (networking-stable-19_09_15).
- net/ibmvnic: Fix EOI when running in XIVE mode (bsc#1089644, ltc#166495, ltc#165544, git-fixes).
- net/mlx4_en: fix a memory leak bug (bsc#1046299).
- net/mlx5: Add device ID of upcoming BlueField-2 (bsc#1046303 ).
- net/mlx5: Fix error handling in mlx5_load() (bsc#1046305 ).
- net: sched: act_sample: fix psample group handling on overwrite (networking-stable-19_09_05).
- net: stmmac: dwmac-rk: Do not fail if phy regulator is absent (networking-stable-19_09_05).
- nfc: fix attrs checks in netlink interface (bsc#1051510).
- nfc: fix memory leak in llcp_sock_bind() (bsc#1051510).
- nfc: pn533: fix use-after-free and memleaks (bsc#1051510).
- objtool: Clobber user CFLAGS variable (bsc#1153236).
- PCI: Correct pci=resource_alignment parameter example (bsc#1051510).
- PCI: dra7xx: Fix legacy INTD IRQ handling (bsc#1087092).
- PCI: hv: Use bytes 4 and 5 from instance ID as the PCI domain numbers (bsc#1153263).
- PCI: PM: Fix pci_power_up() (bsc#1051510).
- pinctrl: tegra: Fix write barrier placement in pmx_writel (bsc#1051510).
- platform/x86: classmate-laptop: remove unused variable (bsc#1051510).
- platform/x86: pmc_atom: Add Siemens SIMATIC IPC277E to critclk_systems DMI table (bsc#1051510).
- powerpc/64s/pseries: radix flush translations before MMU is enabled at boot (bsc#1055186).
- powerpc/64s/radix: keep kernel ERAT over local process/guest invalidates (bsc#1055186).
- powerpc/64s/radix: tidy up TLB flushing code (bsc#1055186).
- powerpc/64s: Rename PPC_INVALIDATE_ERAT to PPC_ISA_3_0_INVALIDATE_ERAT (bsc#1055186).
- powerpc/mm/book3s64: Move book3s64 code to pgtable-book3s64 (bsc#1055186).
- powerpc/mm: mark more tlb functions as __always_inline (bsc#1055186).
- powerpc/mm: Properly invalidate when setting process table base (bsc#1055186).
- powerpc/mm/radix: mark as __tlbie_pid() and friends as__always_inline (bsc#1055186).
- powerpc/mm/radix: mark __radix__flush_tlb_range_psize() as __always_inline (bsc#1055186).
- powerpc/pseries/mobility: use cond_resched when updating device tree (bsc#1153112 ltc#181778).
- powerpc/pseries: Remove confusing warning message (bsc#1109158).
- powerpc/rtas: allow rescheduling while changing cpu states (bsc#1153112 ltc#181778).
- power: supply: sysfs: ratelimit property read error message (bsc#1051510).
- Pull packaging cleanup from mkubecek.
- qed: iWARP - Fix default window size to be based on chip (bsc#1050536 bsc#1050545).
- qed: iWARP - Fix tc for MPA ll2 connection (bsc#1050536 bsc#1050545).
- qed: iWARP - fix uninitialized callback (bsc#1050536 bsc#1050545).
- qed: iWARP - Use READ_ONCE and smp_store_release to access ep->state (bsc#1050536 bsc#1050545).
- RDMA/bnxt_re: Fix spelling mistake 'missin_resp' -> 'missing_resp' (bsc#1050244).
- RDMA: Fix goto target to release the allocated memory (bsc#1050244).
- rtlwifi: rtl8192cu: Fix value set in descriptor (bsc#1142635).
- sch_hhf: ensure quantum and hhf_non_hh_weight are non-zero (networking-stable-19_09_15).
- scripts/arch-symbols: add missing link.
- scsi: lpfc: Fix null ptr oops updating lpfc_devloss_tmo via sysfs attribute (bsc#1140845).
- scsi: lpfc: Fix propagation of devloss_tmo setting to nvme transport (bsc#1140883).
- scsi: lpfc: Remove bg debugfs buffers (bsc#1144375).
- scsi: qedf: fc_rport_priv reference counting fixes (bsc#1098291).
- scsi: qedf: Modify abort and tmf handler to handle edge condition and flush (bsc#1098291).
- scsi: storvsc: setup 1:1 mapping between hardware queue and CPU queue (bsc#1140729).
- sctp: Fix the link time qualifier of 'sctp_ctrlsock_exit()' (networking-stable-19_09_15).
- sctp: use transport pf_retrans in sctp_do_8_2_transport_strike (networking-stable-19_09_15).
- Sign non-x86 kernels when possible (boo#1134303)
- sock_diag: fix autoloading of the raw_diag module (bsc#1152791).
- sock_diag: request _diag module only when the family or proto has been registered (bsc#1152791).
- staging: vt6655: Fix memory leak in vt6655_probe (bsc#1051510).
- tcp: Do not dequeue SYN/FIN-segments from write-queue (git-gixes).
- tcp: fix tcp_ecn_withdraw_cwr() to clear TCP_ECN_QUEUE_CWR (networking-stable-19_09_15).
- tcp: inherit timestamp on mtu probe (networking-stable-19_09_05).
- tcp: remove empty skb from write queue in error cases (networking-stable-19_09_05).
- thermal: Fix use-after-free when unregistering thermal zone device (bsc#1051510).
- thermal_hwmon: Sanitize thermal_zone type (bsc#1051510).
- tipc: add NULL pointer check before calling kfree_rcu (networking-stable-19_09_15).
- tracing: Initialize iter->seq after zeroing in tracing_read_pipe() (bsc#1151508).
- tun: fix use-after-free when register netdev failed (networking-stable-19_09_15).
- tuntap: correctly set SOCKWQ_ASYNC_NOSPACE (bsc#1145099).
- Update patches.suse/NFSv4-Check-the-return-value-of-update_open_stateid.patch (boo#1154189 bsc#1154747).
- usb: adutux: fix NULL-derefs on disconnect (bsc#1142635).
- usb: adutux: fix use-after-free on disconnect (bsc#1142635).
- usb: adutux: fix use-after-free on release (bsc#1051510).
- usb: chaoskey: fix use-after-free on release (bsc#1051510).
- usb: dummy-hcd: fix power budget for SuperSpeed mode (bsc#1051510).
- usb: iowarrior: fix use-after-free after driver unbind (bsc#1051510).
- usb: iowarrior: fix use-after-free on disconnect (bsc#1051510).
- usb: iowarrior: fix use-after-free on release (bsc#1051510).
- usb: legousbtower: fix deadlock on disconnect (bsc#1142635).
- usb: legousbtower: fix open after failed reset request (bsc#1142635).
- usb: legousbtower: fix potential NULL-deref on disconnect (bsc#1142635).
- usb: legousbtower: fix slab info leak at probe (bsc#1142635).
- usb: legousbtower: fix use-after-free on release (bsc#1051510).
- usb: microtek: fix info-leak at probe (bsc#1142635).
- usbnet: ignore endpoints with invalid wMaxPacketSize (bsc#1051510).
- usbnet: sanity checking of packet sizes and device mtu (bsc#1051510).
- usb: serial: fix runtime PM after driver unbind (bsc#1051510).
- usb: serial: ftdi_sio: add device IDs for Sienna and Echelon PL-20 (bsc#1051510).
- usb: serial: keyspan: fix NULL-derefs on open() and write() (bsc#1051510).
- usb: serial: option: add support for Cinterion CLS8 devices (bsc#1051510).
- usb: serial: option: add Telit FN980 compositions (bsc#1051510).
- usb: usblcd: fix I/O after disconnect (bsc#1142635).
- usb: usblp: fix runtime PM after driver unbind (bsc#1051510).
- usb: usb-skeleton: fix NULL-deref on disconnect (bsc#1051510).
- usb: usb-skeleton: fix runtime PM after driver unbind (bsc#1051510).
- usb: usb-skeleton: fix use-after-free after driver unbind (bsc#1051510).
- usb: xhci: wait for CNR controller not ready bit in xhci resume (bsc#1051510).
- usb: yurex: Do not retry on unexpected errors (bsc#1051510).
- usb: yurex: fix NULL-derefs on disconnect (bsc#1051510).
- vfio_pci: Restore original state on release (bsc#1051510).
- vhost_net: conditionally enable tx polling (bsc#1145099).
- video: of: display_timing: Add of_node_put() in of_get_display_timing() (bsc#1051510).
- watchdog: imx2_wdt: fix min() calculation in imx2_wdt_set_timeout (bsc#1051510).
- x86/asm: Fix MWAITX C-state hint value (bsc#1114279).
- x86/mm: Use WRITE_ONCE() when setting PTEs (bsc#1114279).
- xen/netback: fix error path of xenvif_connect_data() (bsc#1065600).
- xen/pv: Fix Xen PV guest int3 handling (bsc#1153811).
- xhci: Check all endpoints for LPM timeout (bsc#1051510).
- xhci: Fix false warning message about wrong bounce buffer write length (bsc#1051510).
- xhci: Increase STS_SAVE timeout in xhci_suspend() (bsc#1051510).
- xhci: Prevent device initiated U1/U2 link pm if exit latency is too long (bsc#1051510).
Patchnames
openSUSE-2019-2392
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel", "title": "Title of the patch" }, { "category": "description", "text": "\n\nThe openSUSE Leap 15.0 kernel was updated to receive various security and bugfixes.\n\nThe following security bugs were fixed:\n\n- CVE-2019-17666: rtl_p2p_noa_ie in drivers/net/wireless/realtek/rtlwifi/ps.c lacked a certain upper-bound check, leading to a buffer overflow (bnc#1154372).\n- CVE-2019-16232: drivers/net/wireless/marvell/libertas/if_sdio.c did not check the alloc_workqueue return value, leading to a NULL pointer dereference (bnc#1150465).\n- CVE-2019-16234: drivers/net/wireless/intel/iwlwifi/pcie/trans.c did not check the alloc_workqueue return value, leading to a NULL pointer dereference (bnc#1150452).\n- CVE-2019-17133: cfg80211_mgd_wext_giwessid in net/wireless/wext-sme.c did not reject a long SSID IE, leading to a Buffer Overflow (bnc#1153158).\n- CVE-2019-17056: llcp_sock_create in net/nfc/llcp_sock.c in the AF_NFC network module did not enforce CAP_NET_RAW, which means that unprivileged users can create a raw socket, aka CID-3a359798b176 (bnc#1152788).\n\nThe following non-security bugs were fixed:\n\n- 9p: avoid attaching writeback_fid on mmap with type PRIVATE (bsc#1051510).\n- ACPI / CPPC: do not require the _PSD method (bsc#1051510).\n- ACPI: CPPC: Set pcc_data[pcc_ss_id] to NULL in acpi_cppc_processor_exit() (bsc#1051510).\n- ACPI / processor: do not print errors for processorIDs == 0xff (bsc#1051510).\n- act_mirred: Fix mirred_init_module error handling (bsc#1051510).\n- Add kernel module compression support (bsc#1135854)\n For enabling the kernel module compress, add the item COMPRESS_MODULES=\u0027xz\u0027 in config.sh, then mkspec will pass it to the spec file.\n- ALSA: hda - Add laptop imic fixup for ASUS M9V laptop (bsc#1051510).\n- ALSA: hda: Add support of Zhaoxin controller (bsc#1051510).\n- ALSA: hda - Apply AMD controller workaround for Raven platform (bsc#1051510).\n- ALSA: hda - Define a fallback_pin_fixup_tbl for alc269 family (bsc#1051510).\n- ALSA: hda - Drop unsol event handler for Intel HDMI codecs (bsc#1051510).\n- ALSA: hda - Expand pin_match function to match upcoming new tbls (bsc#1051510).\n- ALSA: hda: Flush interrupts on disabling (bsc#1051510).\n- ALSA: hda/hdmi: remove redundant assignment to variable pcm_idx (bsc#1051510).\n- ALSA: hda - Inform too slow responses (bsc#1051510).\n- ALSA: hda/realtek - Blacklist PC beep for Lenovo ThinkCentre M73/93 (bsc#1051510).\n- ALSA: hda/realtek - Check beep whitelist before assigning in all codecs (bsc#1051510).\n- ALSA: hda/realtek - Fix alienware headset mic (bsc#1051510).\n- ALSA: hda/realtek: Reduce the Headphone static noise on XPS 9350/9360 (bsc#1051510).\n- ALSA: hda: Set fifo_size for both playback and capture streams (bsc#1051510).\n- ALSA: hda - Show the fatal CORB/RIRB error more clearly (bsc#1051510).\n- ALSA: hda/sigmatel - remove unused variable \u0027stac9200_core_init\u0027 (bsc#1051510).\n- ALSA: i2c: ak4xxx-adda: Fix a possible null pointer dereference in build_adc_controls() (bsc#1051510).\n- ALSA: line6: sizeof (byte) is always 1, use that fact (bsc#1051510).\n- ALSA: usb-audio: Add Pioneer DDJ-SX3 PCM quirck (bsc#1051510).\n- ALSA: usb-audio: Disable quirks for BOSS Katana amplifiers (bsc#1051510).\n- ALSA: usb-audio: Skip bSynchAddress endpoint check if it is invalid (bsc#1051510).\n- appletalk: enforce CAP_NET_RAW for raw sockets (bsc#1051510).\n- ASoC: Define a set of DAPM pre/post-up events (bsc#1051510).\n- ASoC: dmaengine: Make the pcm-\u003ename equal to pcm-\u003eid if the name is not set (bsc#1051510).\n- ASoC: Intel: Fix use of potentially uninitialized variable (bsc#1051510).\n- ASoC: Intel: NHLT: Fix debug print format (bsc#1051510).\n- ASoC: sgtl5000: Fix charge pump source assignment (bsc#1051510).\n- auxdisplay: panel: need to delete scan_timer when misc_register fails in panel_attach (bsc#1051510).\n- ax25: enforce CAP_NET_RAW for raw sockets (bsc#1051510).\n- blacklist \u0027signal: Correct namespace fixups of si_pid and si_uid\u0027 (bsc#1142667)\n- blk-wbt: abstract out end IO completion handler (bsc#1135873).\n- blk-wbt: fix has-sleeper queueing check (bsc#1135873).\n- blk-wbt: improve waking of tasks (bsc#1135873).\n- blk-wbt: move disable check into get_limit() (bsc#1135873).\n- blk-wbt: use wq_has_sleeper() for wq active check (bsc#1135873).\n- block: add io timeout to sysfs (bsc#1148410).\n- block: do not show io_timeout if driver has no timeout handler (bsc#1148410).\n- bluetooth: btrtl: Additional Realtek 8822CE Bluetooth devices (bsc#1051510).\n- bnx2x: Fix VF\u0027s VLAN reconfiguration in reload (bsc#1086323 ).\n- bridge/mdb: remove wrong use of NLM_F_MULTI (networking-stable-19_09_15).\n- btrfs: bail out gracefully rather than BUG_ON (bsc#1153646).\n- btrfs: check for the full sync flag while holding the inode lock during fsync (bsc#1153713).\n- btrfs: Ensure btrfs_init_dev_replace_tgtdev sees up to date values (bsc#1154651).\n- btrfs: Ensure replaced device does not have pending chunk allocation (bsc#1154607).\n- btrfs: remove wrong use of volume_mutex from btrfs_dev_replace_start (bsc#1154651).\n- can: mcp251x: mcp251x_hw_reset(): allow more time after a reset (bsc#1051510).\n- can: xilinx_can: xcan_probe(): skip error message on deferred probe (bsc#1051510).\n- cdc_ether: fix rndis support for Mediatek based smartphones (networking-stable-19_09_15).\n- cdc_ncm: fix divide-by-zero caused by invalid wMaxPacketSize (bsc#1051510).\n- ceph: fix directories inode i_blkbits initialization (bsc#1153717).\n- ceph: reconnect connection if session hang in opening state (bsc#1153718).\n- ceph: update the mtime when truncating up (bsc#1153719).\n- cfg80211: add and use strongly typed element iteration macros (bsc#1051510).\n- cfg80211: Purge frame registrations on iftype change (bsc#1051510).\n- clk: at91: select parent if main oscillator or bypass is enabled (bsc#1051510).\n- clk: qoriq: Fix -Wunused-const-variable (bsc#1051510).\n- clk: sirf: Do not reference clk_init_data after registration (bsc#1051510).\n- clk: zx296718: Do not reference clk_init_data after registration (bsc#1051510).\n- crypto: talitos - fix missing break in switch statement (bsc#1142635).\n- cxgb4: fix endianness for vlan value in cxgb4_tc_flower (bsc#1064802 bsc#1066129).\n- cxgb4: offload VLAN flows regardless of VLAN ethtype (bsc#1064802 bsc#1066129).\n- cxgb4: reduce kernel stack usage in cudbg_collect_mem_region() (bsc#1073513).\n- cxgb4: Signedness bug in init_one() (bsc#1097585 bsc#1097586 bsc#1097587 bsc#1097588 bsc#1097583 bsc#1097584).\n- cxgb4: smt: Add lock for atomic_dec_and_test (bsc#1064802 bsc#1066129).\n- dasd_fba: Display \u002700000000\u0027 for zero page when dumping sense\n- /dev/mem: Bail out upon SIGKILL (git-fixes).\n- drm/amdgpu: Check for valid number of registers to read (bsc#1051510).\n- drm/amdgpu/si: fix ASIC tests (git-fixes).\n- drm/amd/powerplay/smu7: enforce minimal VBITimeout (v2) (bsc#1051510).\n- drm/ast: Fixed reboot test may cause system hanged (bsc#1051510).\n- drm/bridge: tc358767: Increase AUX transfer length limit (bsc#1051510).\n- drm: Flush output polling on shutdown (bsc#1051510).\n- drm/msm/dsi: Implement reset correctly (bsc#1051510).\n- drm/panel: simple: fix AUO g185han01 horizontal blanking (bsc#1051510).\n- drm/radeon: Fix EEH during kexec (bsc#1051510).\n- drm/tilcdc: Register cpufreq notifier after we have initialized crtc (bsc#1051510).\n- drm/vmwgfx: Fix double free in vmw_recv_msg() (bsc#1051510).\n- e1000e: add workaround for possible stalled packet (bsc#1051510).\n- firmware: dmi: Fix unlikely out-of-bounds read in save_mem_devices (git-fixes).\n- Fix AMD IOMMU kABI (bsc#1154610).\n- Fix KVM kABI after x86 mmu backports (bsc#1117665).\n- gpu: drm: radeon: Fix a possible null-pointer dereference in radeon_connector_set_property() (bsc#1051510).\n- HID: apple: Fix stuck function keys when using FN (bsc#1051510).\n- HID: hidraw: Fix invalid read in hidraw_ioctl (bsc#1051510).\n- HID: logitech: Fix general protection fault caused by Logitech driver (bsc#1051510).\n- HID: prodikeys: Fix general protection fault during probe (bsc#1051510).\n- HID: sony: Fix memory corruption issue on cleanup (bsc#1051510).\n- hwmon: (acpi_power_meter) Change log level for \u0027unsafe software power cap\u0027 (bsc#1051510).\n- hwrng: core - do not wait on add_early_randomness() (git-fixes).\n- i2c: riic: Clear NACK in tend isr (bsc#1051510).\n- IB/core, ipoib: Do not overreact to SM LID change event (bsc#1154108)\n- IB/hfi1: Remove overly conservative VM_EXEC flag check (bsc#1144449).\n- IB/mlx5: Consolidate use_umr checks into single function (bsc#1093205).\n- IB/mlx5: Fix MR re-registration flow to use UMR properly (bsc#1093205).\n- IB/mlx5: Report correctly tag matching rendezvous capability (bsc#1046305).\n- ieee802154: atusb: fix use-after-free at disconnect (bsc#1051510).\n- ieee802154: enforce CAP_NET_RAW for raw sockets (bsc#1051510).\n- iio: adc: ad799x: fix probe error handling (bsc#1051510).\n- iio: light: opt3001: fix mutex unlock race (bsc#1051510).\n- ima: always return negative code for error (bsc#1051510).\n- Input: da9063 - fix capability and drop KEY_SLEEP (bsc#1051510).\n- iommu/amd: Apply the same IVRS IOAPIC workaround to Acer Aspire A315-41 (bsc#1137799).\n- iommu/amd: Check PM_LEVEL_SIZE() condition in locked section (bsc#1154608).\n- iommu/amd: Override wrong IVRS IOAPIC on Raven Ridge systems (bsc#1137799).\n- iommu/amd: Remove domain-\u003eupdated (bsc#1154610).\n- iommu/amd: Wait for completion of IOTLB flush in attach_device (bsc#1154611).\n- ipmi_si: Only schedule continuously in the thread in maintenance mode (bsc#1051510).\n- ipv6: Fix the link time qualifier of \u0027ping_v6_proc_exit_net()\u0027 (networking-stable-19_09_15).\n- ixgbe: Prevent u8 wrapping of ITR value to something less than 10us (bsc#1101674).\n- ixgbe: sync the first fragment unconditionally (bsc#1133140).\n- kabi: net: sched: act_sample: fix psample group handling on overwrite (networking-stable-19_09_05).\n- kabi/severities: Whitelist functions internal to radix mm. To call these functions you have to first detect if you are running in radix mm mode which can\u0027t be expected of OOT code.\n- kABI workaround for snd_hda_pick_pin_fixup() changes (bsc#1051510).\n- kernel-binary: Drop .kernel-binary.spec.buildenv (boo#1154578).\n- kernel-binary.spec.in: Fix build of non-modular kernels (boo#1154578).\n- kernel-subpackage-build: create zero size ghost for uncompressed vmlinux (bsc#1154354). It is not strictly necessary to uncompress it so maybe the ghost file can be 0 size in this case.\n- kernel/sysctl.c: do not override max_threads provided by userspace (bnc#1150875).\n- kvm: Convert kvm_lock to a mutex (bsc#1117665).\n- kvm: MMU: drop vcpu param in gpte_access (bsc#1117665).\n- kvm: PPC: Book3S HV: use smp_mb() when setting/clearing host_ipi flag (bsc#1061840).\n- kvm: x86: add tracepoints around __direct_map and FNAME(fetch) (bsc#1117665).\n- kvm: x86: adjust kvm_mmu_page member to save 8 bytes (bsc#1117665).\n- kvm: x86: change kvm_mmu_page_get_gfn BUG_ON to WARN_ON (bsc#1117665).\n- kvm: x86: Do not release the page inside mmu_set_spte() (bsc#1117665).\n- kvm: x86: make FNAME(fetch) and __direct_map more similar (bsc#1117665).\n- kvm: x86, powerpc: do not allow clearing largepages debugfs entry (bsc#1117665).\n- kvm: x86: remove now unneeded hugepage gfn adjustment (bsc#1117665).\n- libertas: Add missing sentinel at end of if_usb.c fw_table (bsc#1051510).\n- lib/mpi: Fix karactx leak in mpi_powm (bsc#1051510).\n- mac80211: accept deauth frames in IBSS mode (bsc#1051510).\n- macsec: drop skb sk before calling gro_cells_receive (bsc#1051510).\n- media: atmel: atmel-isc: fix asd memory allocation (bsc#1135642).\n- media: cpia2_usb: fix memory leaks (bsc#1051510).\n- media: dvb-core: fix a memory leak bug (bsc#1051510).\n- media: exynos4-is: fix leaked of_node references (bsc#1051510).\n- media: gspca: zero usb_buf on error (bsc#1051510).\n- media: hdpvr: Add device num check and handling (bsc#1051510).\n- media: hdpvr: add terminating 0 at end of string (bsc#1051510).\n- media: i2c: ov5645: Fix power sequence (bsc#1051510).\n- media: iguanair: add sanity checks (bsc#1051510).\n- media: omap3isp: Do not set streaming state on random subdevs (bsc#1051510).\n- media: omap3isp: Set device on omap3isp subdevs (bsc#1051510).\n- media: ov9650: add a sanity check (bsc#1051510).\n- media: radio/si470x: kill urb on error (bsc#1051510).\n- media: saa7134: fix terminology around saa7134_i2c_eeprom_md7134_gate() (bsc#1051510).\n- media: saa7146: add cleanup in hexium_attach() (bsc#1051510).\n- media: sn9c20x: Add MSI MS-1039 laptop to flip_dmi_table (bsc#1051510).\n- media: stkwebcam: fix runtime PM after driver unbind (bsc#1051510).\n- media: ttusb-dec: Fix info-leak in ttusb_dec_send_command() (bsc#1051510).\n- memstick: jmb38x_ms: Fix an error handling path in \u0027jmb38x_ms_probe()\u0027 (bsc#1051510).\n- mfd: intel-lpss: Remove D3cold delay (bsc#1051510).\n- mISDN: enforce CAP_NET_RAW for raw sockets (bsc#1051510).\n- mld: fix memory leak in mld_del_delrec() (networking-stable-19_09_05).\n- mmc: sdhci: Fix incorrect switch to HS mode (bsc#1051510).\n- mmc: sdhci: improve ADMA error reporting (bsc#1051510).\n- mmc: sdhci-of-esdhc: set DMA snooping based on DMA coherence (bsc#1051510).\n- net: Fix null de-reference of device refcount (networking-stable-19_09_15).\n- net: fix skb use after free in netpoll (networking-stable-19_09_05).\n- net: gso: Fix skb_segment splat when splitting gso_size mangled skb having linear-headed frag_list (networking-stable-19_09_15).\n- net/ibmvnic: Fix EOI when running in XIVE mode (bsc#1089644, ltc#166495, ltc#165544, git-fixes).\n- net/mlx4_en: fix a memory leak bug (bsc#1046299).\n- net/mlx5: Add device ID of upcoming BlueField-2 (bsc#1046303 ).\n- net/mlx5: Fix error handling in mlx5_load() (bsc#1046305 ).\n- net: sched: act_sample: fix psample group handling on overwrite (networking-stable-19_09_05).\n- net: stmmac: dwmac-rk: Do not fail if phy regulator is absent (networking-stable-19_09_05).\n- nfc: fix attrs checks in netlink interface (bsc#1051510).\n- nfc: fix memory leak in llcp_sock_bind() (bsc#1051510).\n- nfc: pn533: fix use-after-free and memleaks (bsc#1051510).\n- objtool: Clobber user CFLAGS variable (bsc#1153236).\n- PCI: Correct pci=resource_alignment parameter example (bsc#1051510).\n- PCI: dra7xx: Fix legacy INTD IRQ handling (bsc#1087092).\n- PCI: hv: Use bytes 4 and 5 from instance ID as the PCI domain numbers (bsc#1153263).\n- PCI: PM: Fix pci_power_up() (bsc#1051510).\n- pinctrl: tegra: Fix write barrier placement in pmx_writel (bsc#1051510).\n- platform/x86: classmate-laptop: remove unused variable (bsc#1051510).\n- platform/x86: pmc_atom: Add Siemens SIMATIC IPC277E to critclk_systems DMI table (bsc#1051510).\n- powerpc/64s/pseries: radix flush translations before MMU is enabled at boot (bsc#1055186).\n- powerpc/64s/radix: keep kernel ERAT over local process/guest invalidates (bsc#1055186).\n- powerpc/64s/radix: tidy up TLB flushing code (bsc#1055186).\n- powerpc/64s: Rename PPC_INVALIDATE_ERAT to PPC_ISA_3_0_INVALIDATE_ERAT (bsc#1055186).\n- powerpc/mm/book3s64: Move book3s64 code to pgtable-book3s64 (bsc#1055186).\n- powerpc/mm: mark more tlb functions as __always_inline (bsc#1055186).\n- powerpc/mm: Properly invalidate when setting process table base (bsc#1055186).\n- powerpc/mm/radix: mark as __tlbie_pid() and friends as__always_inline (bsc#1055186).\n- powerpc/mm/radix: mark __radix__flush_tlb_range_psize() as __always_inline (bsc#1055186).\n- powerpc/pseries/mobility: use cond_resched when updating device tree (bsc#1153112 ltc#181778).\n- powerpc/pseries: Remove confusing warning message (bsc#1109158).\n- powerpc/rtas: allow rescheduling while changing cpu states (bsc#1153112 ltc#181778).\n- power: supply: sysfs: ratelimit property read error message (bsc#1051510).\n- Pull packaging cleanup from mkubecek.\n- qed: iWARP - Fix default window size to be based on chip (bsc#1050536 bsc#1050545).\n- qed: iWARP - Fix tc for MPA ll2 connection (bsc#1050536 bsc#1050545).\n- qed: iWARP - fix uninitialized callback (bsc#1050536 bsc#1050545).\n- qed: iWARP - Use READ_ONCE and smp_store_release to access ep-\u003estate (bsc#1050536 bsc#1050545).\n- RDMA/bnxt_re: Fix spelling mistake \u0027missin_resp\u0027 -\u003e \u0027missing_resp\u0027 (bsc#1050244).\n- RDMA: Fix goto target to release the allocated memory (bsc#1050244).\n- rtlwifi: rtl8192cu: Fix value set in descriptor (bsc#1142635).\n- sch_hhf: ensure quantum and hhf_non_hh_weight are non-zero (networking-stable-19_09_15).\n- scripts/arch-symbols: add missing link.\n- scsi: lpfc: Fix null ptr oops updating lpfc_devloss_tmo via sysfs attribute (bsc#1140845).\n- scsi: lpfc: Fix propagation of devloss_tmo setting to nvme transport (bsc#1140883).\n- scsi: lpfc: Remove bg debugfs buffers (bsc#1144375).\n- scsi: qedf: fc_rport_priv reference counting fixes (bsc#1098291).\n- scsi: qedf: Modify abort and tmf handler to handle edge condition and flush (bsc#1098291).\n- scsi: storvsc: setup 1:1 mapping between hardware queue and CPU queue (bsc#1140729).\n- sctp: Fix the link time qualifier of \u0027sctp_ctrlsock_exit()\u0027 (networking-stable-19_09_15).\n- sctp: use transport pf_retrans in sctp_do_8_2_transport_strike (networking-stable-19_09_15).\n- Sign non-x86 kernels when possible (boo#1134303)\n- sock_diag: fix autoloading of the raw_diag module (bsc#1152791).\n- sock_diag: request _diag module only when the family or proto has been registered (bsc#1152791).\n- staging: vt6655: Fix memory leak in vt6655_probe (bsc#1051510).\n- tcp: Do not dequeue SYN/FIN-segments from write-queue (git-gixes).\n- tcp: fix tcp_ecn_withdraw_cwr() to clear TCP_ECN_QUEUE_CWR (networking-stable-19_09_15).\n- tcp: inherit timestamp on mtu probe (networking-stable-19_09_05).\n- tcp: remove empty skb from write queue in error cases (networking-stable-19_09_05).\n- thermal: Fix use-after-free when unregistering thermal zone device (bsc#1051510).\n- thermal_hwmon: Sanitize thermal_zone type (bsc#1051510).\n- tipc: add NULL pointer check before calling kfree_rcu (networking-stable-19_09_15).\n- tracing: Initialize iter-\u003eseq after zeroing in tracing_read_pipe() (bsc#1151508).\n- tun: fix use-after-free when register netdev failed (networking-stable-19_09_15).\n- tuntap: correctly set SOCKWQ_ASYNC_NOSPACE (bsc#1145099).\n- Update patches.suse/NFSv4-Check-the-return-value-of-update_open_stateid.patch (boo#1154189 bsc#1154747).\n- usb: adutux: fix NULL-derefs on disconnect (bsc#1142635).\n- usb: adutux: fix use-after-free on disconnect (bsc#1142635).\n- usb: adutux: fix use-after-free on release (bsc#1051510).\n- usb: chaoskey: fix use-after-free on release (bsc#1051510).\n- usb: dummy-hcd: fix power budget for SuperSpeed mode (bsc#1051510).\n- usb: iowarrior: fix use-after-free after driver unbind (bsc#1051510).\n- usb: iowarrior: fix use-after-free on disconnect (bsc#1051510).\n- usb: iowarrior: fix use-after-free on release (bsc#1051510).\n- usb: legousbtower: fix deadlock on disconnect (bsc#1142635).\n- usb: legousbtower: fix open after failed reset request (bsc#1142635).\n- usb: legousbtower: fix potential NULL-deref on disconnect (bsc#1142635).\n- usb: legousbtower: fix slab info leak at probe (bsc#1142635).\n- usb: legousbtower: fix use-after-free on release (bsc#1051510).\n- usb: microtek: fix info-leak at probe (bsc#1142635).\n- usbnet: ignore endpoints with invalid wMaxPacketSize (bsc#1051510).\n- usbnet: sanity checking of packet sizes and device mtu (bsc#1051510).\n- usb: serial: fix runtime PM after driver unbind (bsc#1051510).\n- usb: serial: ftdi_sio: add device IDs for Sienna and Echelon PL-20 (bsc#1051510).\n- usb: serial: keyspan: fix NULL-derefs on open() and write() (bsc#1051510).\n- usb: serial: option: add support for Cinterion CLS8 devices (bsc#1051510).\n- usb: serial: option: add Telit FN980 compositions (bsc#1051510).\n- usb: usblcd: fix I/O after disconnect (bsc#1142635).\n- usb: usblp: fix runtime PM after driver unbind (bsc#1051510).\n- usb: usb-skeleton: fix NULL-deref on disconnect (bsc#1051510).\n- usb: usb-skeleton: fix runtime PM after driver unbind (bsc#1051510).\n- usb: usb-skeleton: fix use-after-free after driver unbind (bsc#1051510).\n- usb: xhci: wait for CNR controller not ready bit in xhci resume (bsc#1051510).\n- usb: yurex: Do not retry on unexpected errors (bsc#1051510).\n- usb: yurex: fix NULL-derefs on disconnect (bsc#1051510).\n- vfio_pci: Restore original state on release (bsc#1051510).\n- vhost_net: conditionally enable tx polling (bsc#1145099).\n- video: of: display_timing: Add of_node_put() in of_get_display_timing() (bsc#1051510).\n- watchdog: imx2_wdt: fix min() calculation in imx2_wdt_set_timeout (bsc#1051510).\n- x86/asm: Fix MWAITX C-state hint value (bsc#1114279).\n- x86/mm: Use WRITE_ONCE() when setting PTEs (bsc#1114279).\n- xen/netback: fix error path of xenvif_connect_data() (bsc#1065600).\n- xen/pv: Fix Xen PV guest int3 handling (bsc#1153811).\n- xhci: Check all endpoints for LPM timeout (bsc#1051510).\n- xhci: Fix false warning message about wrong bounce buffer write length (bsc#1051510).\n- xhci: Increase STS_SAVE timeout in xhci_suspend() (bsc#1051510).\n- xhci: Prevent device initiated U1/U2 link pm if exit latency is too long (bsc#1051510).\n", "title": "Description of the patch" }, { "category": "details", "text": "openSUSE-2019-2392", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2019_2392-1.json" }, { "category": "self", "summary": "URL for openSUSE-SU-2019:2392-1", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/Q4WWYJXXZCGVC2OIDWXE4ESZ2GFQW5ER/#Q4WWYJXXZCGVC2OIDWXE4ESZ2GFQW5ER" }, { "category": "self", "summary": "E-Mail link for openSUSE-SU-2019:2392-1", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/Q4WWYJXXZCGVC2OIDWXE4ESZ2GFQW5ER/#Q4WWYJXXZCGVC2OIDWXE4ESZ2GFQW5ER" }, { "category": "self", "summary": "SUSE Bug 1046299", "url": "https://bugzilla.suse.com/1046299" }, { "category": "self", "summary": "SUSE Bug 1046303", "url": "https://bugzilla.suse.com/1046303" }, { "category": "self", "summary": "SUSE Bug 1046305", "url": "https://bugzilla.suse.com/1046305" }, { "category": "self", "summary": "SUSE Bug 1050244", "url": "https://bugzilla.suse.com/1050244" }, { "category": "self", "summary": "SUSE Bug 1050536", "url": "https://bugzilla.suse.com/1050536" }, { "category": "self", "summary": "SUSE Bug 1050545", "url": "https://bugzilla.suse.com/1050545" }, { "category": "self", "summary": "SUSE Bug 1051510", "url": "https://bugzilla.suse.com/1051510" }, { "category": "self", "summary": "SUSE Bug 1055186", "url": "https://bugzilla.suse.com/1055186" }, { "category": "self", "summary": "SUSE Bug 1061840", "url": "https://bugzilla.suse.com/1061840" }, { "category": "self", "summary": "SUSE Bug 1064802", "url": "https://bugzilla.suse.com/1064802" }, { "category": "self", "summary": "SUSE Bug 1065600", "url": "https://bugzilla.suse.com/1065600" }, { "category": "self", "summary": "SUSE Bug 1066129", "url": "https://bugzilla.suse.com/1066129" }, { "category": "self", "summary": "SUSE Bug 1073513", "url": "https://bugzilla.suse.com/1073513" }, { "category": "self", "summary": "SUSE Bug 1086323", "url": "https://bugzilla.suse.com/1086323" }, { "category": "self", "summary": "SUSE Bug 1087092", "url": "https://bugzilla.suse.com/1087092" }, { "category": "self", "summary": "SUSE Bug 1089644", "url": "https://bugzilla.suse.com/1089644" }, { "category": "self", "summary": "SUSE Bug 1093205", "url": "https://bugzilla.suse.com/1093205" }, { "category": "self", "summary": "SUSE Bug 1097583", "url": "https://bugzilla.suse.com/1097583" }, { "category": "self", "summary": "SUSE Bug 1097584", "url": "https://bugzilla.suse.com/1097584" }, { "category": "self", "summary": "SUSE Bug 1097585", "url": "https://bugzilla.suse.com/1097585" }, { "category": "self", "summary": "SUSE Bug 1097586", "url": "https://bugzilla.suse.com/1097586" }, { "category": "self", "summary": "SUSE Bug 1097587", "url": "https://bugzilla.suse.com/1097587" }, { "category": "self", "summary": "SUSE Bug 1097588", "url": "https://bugzilla.suse.com/1097588" }, { "category": "self", "summary": "SUSE Bug 1098291", "url": "https://bugzilla.suse.com/1098291" }, { "category": "self", "summary": "SUSE Bug 1101674", "url": "https://bugzilla.suse.com/1101674" }, { "category": "self", "summary": "SUSE Bug 1109158", "url": "https://bugzilla.suse.com/1109158" }, { "category": "self", "summary": "SUSE Bug 1114279", "url": "https://bugzilla.suse.com/1114279" }, { "category": "self", "summary": "SUSE Bug 1117665", "url": "https://bugzilla.suse.com/1117665" }, { "category": "self", "summary": "SUSE Bug 1123080", "url": "https://bugzilla.suse.com/1123080" }, { "category": "self", "summary": "SUSE Bug 1133140", "url": "https://bugzilla.suse.com/1133140" }, { "category": "self", "summary": "SUSE Bug 1134303", "url": "https://bugzilla.suse.com/1134303" }, { "category": "self", "summary": "SUSE Bug 1135642", "url": "https://bugzilla.suse.com/1135642" }, { "category": "self", "summary": "SUSE Bug 1135854", "url": "https://bugzilla.suse.com/1135854" }, { "category": "self", "summary": "SUSE Bug 1135873", "url": "https://bugzilla.suse.com/1135873" }, { "category": "self", "summary": "SUSE Bug 1137799", "url": "https://bugzilla.suse.com/1137799" }, { "category": "self", "summary": "SUSE Bug 1140729", "url": "https://bugzilla.suse.com/1140729" }, { "category": "self", "summary": "SUSE Bug 1140845", "url": "https://bugzilla.suse.com/1140845" }, { "category": "self", "summary": "SUSE Bug 1140883", "url": "https://bugzilla.suse.com/1140883" }, { "category": "self", "summary": "SUSE Bug 1141600", "url": "https://bugzilla.suse.com/1141600" }, { "category": "self", "summary": "SUSE Bug 1142635", "url": "https://bugzilla.suse.com/1142635" }, { "category": "self", "summary": "SUSE Bug 1142667", "url": "https://bugzilla.suse.com/1142667" }, { "category": "self", "summary": "SUSE Bug 1144375", "url": "https://bugzilla.suse.com/1144375" }, { "category": "self", "summary": "SUSE Bug 1144449", "url": "https://bugzilla.suse.com/1144449" }, { "category": "self", "summary": "SUSE Bug 1145099", "url": "https://bugzilla.suse.com/1145099" }, { "category": "self", "summary": "SUSE Bug 1148410", "url": "https://bugzilla.suse.com/1148410" }, { "category": "self", "summary": "SUSE Bug 1150452", "url": "https://bugzilla.suse.com/1150452" }, { "category": "self", "summary": "SUSE Bug 1150465", "url": "https://bugzilla.suse.com/1150465" }, { "category": "self", "summary": "SUSE Bug 1150875", "url": "https://bugzilla.suse.com/1150875" }, { "category": "self", "summary": "SUSE Bug 1151508", "url": "https://bugzilla.suse.com/1151508" }, { "category": "self", "summary": "SUSE Bug 1152788", "url": "https://bugzilla.suse.com/1152788" }, { "category": "self", "summary": "SUSE Bug 1152791", "url": "https://bugzilla.suse.com/1152791" }, { "category": "self", "summary": "SUSE Bug 1153112", "url": "https://bugzilla.suse.com/1153112" }, { "category": "self", "summary": "SUSE Bug 1153158", "url": "https://bugzilla.suse.com/1153158" }, { "category": "self", "summary": "SUSE Bug 1153236", "url": "https://bugzilla.suse.com/1153236" }, { "category": "self", "summary": "SUSE Bug 1153263", "url": "https://bugzilla.suse.com/1153263" }, { "category": "self", "summary": "SUSE Bug 1153646", "url": "https://bugzilla.suse.com/1153646" }, { "category": "self", "summary": "SUSE Bug 1153713", "url": "https://bugzilla.suse.com/1153713" }, { "category": "self", "summary": "SUSE Bug 1153717", "url": "https://bugzilla.suse.com/1153717" }, { "category": "self", "summary": "SUSE Bug 1153718", "url": "https://bugzilla.suse.com/1153718" }, { "category": "self", "summary": "SUSE Bug 1153719", "url": "https://bugzilla.suse.com/1153719" }, { "category": "self", "summary": "SUSE Bug 1153811", "url": "https://bugzilla.suse.com/1153811" }, { "category": "self", "summary": "SUSE Bug 1154108", "url": "https://bugzilla.suse.com/1154108" }, { "category": "self", "summary": "SUSE Bug 1154189", "url": "https://bugzilla.suse.com/1154189" }, { "category": "self", "summary": "SUSE Bug 1154354", "url": "https://bugzilla.suse.com/1154354" }, { "category": "self", "summary": "SUSE Bug 1154372", "url": "https://bugzilla.suse.com/1154372" }, { "category": "self", "summary": "SUSE Bug 1154578", "url": "https://bugzilla.suse.com/1154578" }, { "category": "self", "summary": "SUSE Bug 1154607", "url": "https://bugzilla.suse.com/1154607" }, { "category": "self", "summary": "SUSE Bug 1154608", "url": "https://bugzilla.suse.com/1154608" }, { "category": "self", "summary": "SUSE Bug 1154610", "url": "https://bugzilla.suse.com/1154610" }, { "category": "self", "summary": "SUSE Bug 1154611", "url": "https://bugzilla.suse.com/1154611" }, { "category": "self", "summary": "SUSE Bug 1154651", "url": "https://bugzilla.suse.com/1154651" }, { "category": "self", "summary": "SUSE Bug 1154747", "url": "https://bugzilla.suse.com/1154747" }, { "category": "self", "summary": "SUSE Bug 118461_FIXME", "url": "https://bugzilla.suse.com/118461_FIXME" }, { "category": "self", "summary": "SUSE Bug 133135_FIXME", "url": "https://bugzilla.suse.com/133135_FIXME" }, { "category": "self", "summary": "SUSE Bug 135757_FIXME", "url": "https://bugzilla.suse.com/135757_FIXME" }, { "category": "self", "summary": "SUSE Bug 147830_FIXME", "url": "https://bugzilla.suse.com/147830_FIXME" }, { "category": "self", "summary": "SUSE Bug 147831_FIXME", "url": "https://bugzilla.suse.com/147831_FIXME" }, { "category": "self", "summary": "SUSE Bug 158172_FIXME", "url": "https://bugzilla.suse.com/158172_FIXME" }, { "category": "self", "summary": "SUSE Bug 165544_FIXME", "url": "https://bugzilla.suse.com/165544_FIXME" }, { "category": "self", "summary": "SUSE Bug 166495_FIXME", "url": "https://bugzilla.suse.com/166495_FIXME" }, { "category": "self", "summary": "SUSE Bug 172859_FIXME", "url": "https://bugzilla.suse.com/172859_FIXME" }, { "category": "self", "summary": "SUSE Bug 172860_FIXME", "url": "https://bugzilla.suse.com/172860_FIXME" }, { "category": "self", "summary": "SUSE Bug 181778_FIXME", "url": "https://bugzilla.suse.com/181778_FIXME" }, { "category": "self", "summary": "SUSE Bug 229268_FIXME", "url": "https://bugzilla.suse.com/229268_FIXME" }, { "category": "self", "summary": "SUSE Bug 229269_FIXME", "url": "https://bugzilla.suse.com/229269_FIXME" }, { "category": "self", "summary": "SUSE Bug 229270_FIXME", "url": "https://bugzilla.suse.com/229270_FIXME" }, { "category": "self", "summary": "SUSE Bug 229274_FIXME", "url": "https://bugzilla.suse.com/229274_FIXME" }, { "category": "self", "summary": "SUSE Bug 229277_FIXME", "url": "https://bugzilla.suse.com/229277_FIXME" }, { "category": "self", "summary": "SUSE Bug 229279_FIXME", "url": "https://bugzilla.suse.com/229279_FIXME" }, { "category": "self", "summary": "SUSE Bug 229280_FIXME", "url": "https://bugzilla.suse.com/229280_FIXME" }, { "category": "self", "summary": "SUSE Bug 229281_FIXME", "url": "https://bugzilla.suse.com/229281_FIXME" }, { "category": "self", "summary": "SUSE Bug 229283_FIXME", "url": "https://bugzilla.suse.com/229283_FIXME" }, { "category": "self", "summary": "SUSE Bug 229285_FIXME", "url": "https://bugzilla.suse.com/229285_FIXME" }, { "category": "self", "summary": "SUSE Bug 229286_FIXME", "url": "https://bugzilla.suse.com/229286_FIXME" }, { "category": "self", "summary": "SUSE Bug 229297_FIXME", "url": "https://bugzilla.suse.com/229297_FIXME" }, { "category": "self", "summary": "SUSE Bug 296718_FIXME", "url": "https://bugzilla.suse.com/296718_FIXME" }, { "category": "self", "summary": "SUSE Bug 358767_FIXME", "url": "https://bugzilla.suse.com/358767_FIXME" }, { "category": "self", "summary": "SUSE Bug 359798_FIXME", "url": "https://bugzilla.suse.com/359798_FIXME" }, { "category": "self", "summary": "SUSE Bug 802154", "url": "https://bugzilla.suse.com/802154" }, { "category": "self", "summary": "SUSE Bug 814594", "url": "https://bugzilla.suse.com/814594" }, { "category": "self", "summary": "SUSE Bug 919448", "url": "https://bugzilla.suse.com/919448" }, { "category": "self", "summary": "SUSE Bug 987367", "url": "https://bugzilla.suse.com/987367" }, { "category": "self", "summary": "SUSE Bug 998153", "url": "https://bugzilla.suse.com/998153" }, { "category": "self", "summary": "SUSE CVE CVE-2019-16232 page", "url": "https://www.suse.com/security/cve/CVE-2019-16232/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-16234 page", "url": "https://www.suse.com/security/cve/CVE-2019-16234/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-17056 page", "url": "https://www.suse.com/security/cve/CVE-2019-17056/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-17133 page", "url": "https://www.suse.com/security/cve/CVE-2019-17133/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-17666 page", "url": "https://www.suse.com/security/cve/CVE-2019-17666/" } ], "title": "Security update for the Linux Kernel", "tracking": { "current_release_date": "2019-10-27T18:35:05Z", "generator": { "date": "2019-10-27T18:35:05Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "openSUSE-SU-2019:2392-1", "initial_release_date": "2019-10-27T18:35:05Z", "revision_history": [ { "date": "2019-10-27T18:35:05Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kernel-devel-4.12.14-lp150.12.79.1.noarch", "product": { "name": "kernel-devel-4.12.14-lp150.12.79.1.noarch", "product_id": "kernel-devel-4.12.14-lp150.12.79.1.noarch" } }, { "category": "product_version", "name": "kernel-docs-4.12.14-lp150.12.79.1.noarch", "product": { "name": "kernel-docs-4.12.14-lp150.12.79.1.noarch", "product_id": "kernel-docs-4.12.14-lp150.12.79.1.noarch" } }, { "category": "product_version", "name": "kernel-docs-html-4.12.14-lp150.12.79.1.noarch", "product": { "name": "kernel-docs-html-4.12.14-lp150.12.79.1.noarch", "product_id": "kernel-docs-html-4.12.14-lp150.12.79.1.noarch" } }, { "category": "product_version", "name": "kernel-macros-4.12.14-lp150.12.79.1.noarch", "product": { "name": "kernel-macros-4.12.14-lp150.12.79.1.noarch", "product_id": "kernel-macros-4.12.14-lp150.12.79.1.noarch" } }, { "category": "product_version", "name": "kernel-source-4.12.14-lp150.12.79.1.noarch", "product": { "name": "kernel-source-4.12.14-lp150.12.79.1.noarch", "product_id": "kernel-source-4.12.14-lp150.12.79.1.noarch" } }, { "category": "product_version", "name": "kernel-source-vanilla-4.12.14-lp150.12.79.1.noarch", "product": { "name": "kernel-source-vanilla-4.12.14-lp150.12.79.1.noarch", "product_id": "kernel-source-vanilla-4.12.14-lp150.12.79.1.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "kernel-debug-4.12.14-lp150.12.79.1.x86_64", "product": { "name": "kernel-debug-4.12.14-lp150.12.79.1.x86_64", "product_id": "kernel-debug-4.12.14-lp150.12.79.1.x86_64" } }, { "category": "product_version", "name": "kernel-debug-base-4.12.14-lp150.12.79.1.x86_64", "product": { "name": "kernel-debug-base-4.12.14-lp150.12.79.1.x86_64", "product_id": "kernel-debug-base-4.12.14-lp150.12.79.1.x86_64" } }, { "category": "product_version", "name": "kernel-debug-devel-4.12.14-lp150.12.79.1.x86_64", "product": { "name": "kernel-debug-devel-4.12.14-lp150.12.79.1.x86_64", "product_id": "kernel-debug-devel-4.12.14-lp150.12.79.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-4.12.14-lp150.12.79.1.x86_64", "product": { "name": "kernel-default-4.12.14-lp150.12.79.1.x86_64", "product_id": "kernel-default-4.12.14-lp150.12.79.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-base-4.12.14-lp150.12.79.1.x86_64", "product": { "name": "kernel-default-base-4.12.14-lp150.12.79.1.x86_64", "product_id": "kernel-default-base-4.12.14-lp150.12.79.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-devel-4.12.14-lp150.12.79.1.x86_64", "product": { "name": "kernel-default-devel-4.12.14-lp150.12.79.1.x86_64", "product_id": "kernel-default-devel-4.12.14-lp150.12.79.1.x86_64" } }, { "category": "product_version", "name": "kernel-kvmsmall-4.12.14-lp150.12.79.1.x86_64", "product": { "name": "kernel-kvmsmall-4.12.14-lp150.12.79.1.x86_64", "product_id": "kernel-kvmsmall-4.12.14-lp150.12.79.1.x86_64" } }, { "category": "product_version", "name": "kernel-kvmsmall-base-4.12.14-lp150.12.79.1.x86_64", "product": { "name": "kernel-kvmsmall-base-4.12.14-lp150.12.79.1.x86_64", "product_id": "kernel-kvmsmall-base-4.12.14-lp150.12.79.1.x86_64" } }, { "category": "product_version", "name": "kernel-kvmsmall-devel-4.12.14-lp150.12.79.1.x86_64", "product": { "name": "kernel-kvmsmall-devel-4.12.14-lp150.12.79.1.x86_64", "product_id": "kernel-kvmsmall-devel-4.12.14-lp150.12.79.1.x86_64" } }, { "category": "product_version", "name": "kernel-obs-build-4.12.14-lp150.12.79.1.x86_64", "product": { "name": "kernel-obs-build-4.12.14-lp150.12.79.1.x86_64", "product_id": "kernel-obs-build-4.12.14-lp150.12.79.1.x86_64" } }, { "category": "product_version", "name": "kernel-obs-qa-4.12.14-lp150.12.79.1.x86_64", "product": { "name": "kernel-obs-qa-4.12.14-lp150.12.79.1.x86_64", "product_id": "kernel-obs-qa-4.12.14-lp150.12.79.1.x86_64" } }, { "category": "product_version", "name": "kernel-syms-4.12.14-lp150.12.79.1.x86_64", "product": { "name": "kernel-syms-4.12.14-lp150.12.79.1.x86_64", "product_id": "kernel-syms-4.12.14-lp150.12.79.1.x86_64" } }, { "category": "product_version", "name": "kernel-vanilla-4.12.14-lp150.12.79.1.x86_64", "product": { "name": "kernel-vanilla-4.12.14-lp150.12.79.1.x86_64", "product_id": "kernel-vanilla-4.12.14-lp150.12.79.1.x86_64" } }, { "category": "product_version", "name": "kernel-vanilla-base-4.12.14-lp150.12.79.1.x86_64", "product": { "name": "kernel-vanilla-base-4.12.14-lp150.12.79.1.x86_64", "product_id": "kernel-vanilla-base-4.12.14-lp150.12.79.1.x86_64" } }, { "category": "product_version", "name": "kernel-vanilla-devel-4.12.14-lp150.12.79.1.x86_64", "product": { "name": "kernel-vanilla-devel-4.12.14-lp150.12.79.1.x86_64", "product_id": "kernel-vanilla-devel-4.12.14-lp150.12.79.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "openSUSE Leap 15.0", "product": { "name": "openSUSE Leap 15.0", "product_id": "openSUSE Leap 15.0", "product_identification_helper": { "cpe": "cpe:/o:opensuse:leap:15.0" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-4.12.14-lp150.12.79.1.x86_64 as component of openSUSE Leap 15.0", "product_id": "openSUSE Leap 15.0:kernel-debug-4.12.14-lp150.12.79.1.x86_64" }, "product_reference": "kernel-debug-4.12.14-lp150.12.79.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-base-4.12.14-lp150.12.79.1.x86_64 as component of openSUSE Leap 15.0", "product_id": "openSUSE Leap 15.0:kernel-debug-base-4.12.14-lp150.12.79.1.x86_64" }, "product_reference": "kernel-debug-base-4.12.14-lp150.12.79.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-4.12.14-lp150.12.79.1.x86_64 as component of openSUSE Leap 15.0", "product_id": "openSUSE Leap 15.0:kernel-debug-devel-4.12.14-lp150.12.79.1.x86_64" }, "product_reference": "kernel-debug-devel-4.12.14-lp150.12.79.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-lp150.12.79.1.x86_64 as component of openSUSE Leap 15.0", "product_id": "openSUSE Leap 15.0:kernel-default-4.12.14-lp150.12.79.1.x86_64" }, "product_reference": "kernel-default-4.12.14-lp150.12.79.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.12.14-lp150.12.79.1.x86_64 as component of openSUSE Leap 15.0", "product_id": "openSUSE Leap 15.0:kernel-default-base-4.12.14-lp150.12.79.1.x86_64" }, "product_reference": "kernel-default-base-4.12.14-lp150.12.79.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-lp150.12.79.1.x86_64 as component of openSUSE Leap 15.0", "product_id": "openSUSE Leap 15.0:kernel-default-devel-4.12.14-lp150.12.79.1.x86_64" }, "product_reference": "kernel-default-devel-4.12.14-lp150.12.79.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-4.12.14-lp150.12.79.1.noarch as component of openSUSE Leap 15.0", "product_id": "openSUSE Leap 15.0:kernel-devel-4.12.14-lp150.12.79.1.noarch" }, "product_reference": "kernel-devel-4.12.14-lp150.12.79.1.noarch", "relates_to_product_reference": "openSUSE Leap 15.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-docs-4.12.14-lp150.12.79.1.noarch as component of openSUSE Leap 15.0", "product_id": "openSUSE Leap 15.0:kernel-docs-4.12.14-lp150.12.79.1.noarch" }, "product_reference": "kernel-docs-4.12.14-lp150.12.79.1.noarch", "relates_to_product_reference": "openSUSE Leap 15.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-docs-html-4.12.14-lp150.12.79.1.noarch as component of openSUSE Leap 15.0", "product_id": "openSUSE Leap 15.0:kernel-docs-html-4.12.14-lp150.12.79.1.noarch" }, "product_reference": "kernel-docs-html-4.12.14-lp150.12.79.1.noarch", "relates_to_product_reference": "openSUSE Leap 15.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kvmsmall-4.12.14-lp150.12.79.1.x86_64 as component of openSUSE Leap 15.0", "product_id": "openSUSE Leap 15.0:kernel-kvmsmall-4.12.14-lp150.12.79.1.x86_64" }, "product_reference": "kernel-kvmsmall-4.12.14-lp150.12.79.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kvmsmall-base-4.12.14-lp150.12.79.1.x86_64 as component of openSUSE Leap 15.0", "product_id": "openSUSE Leap 15.0:kernel-kvmsmall-base-4.12.14-lp150.12.79.1.x86_64" }, "product_reference": "kernel-kvmsmall-base-4.12.14-lp150.12.79.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kvmsmall-devel-4.12.14-lp150.12.79.1.x86_64 as component of openSUSE Leap 15.0", "product_id": "openSUSE Leap 15.0:kernel-kvmsmall-devel-4.12.14-lp150.12.79.1.x86_64" }, "product_reference": "kernel-kvmsmall-devel-4.12.14-lp150.12.79.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-4.12.14-lp150.12.79.1.noarch as component of openSUSE Leap 15.0", "product_id": "openSUSE Leap 15.0:kernel-macros-4.12.14-lp150.12.79.1.noarch" }, "product_reference": "kernel-macros-4.12.14-lp150.12.79.1.noarch", "relates_to_product_reference": "openSUSE Leap 15.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-4.12.14-lp150.12.79.1.x86_64 as component of openSUSE Leap 15.0", "product_id": "openSUSE Leap 15.0:kernel-obs-build-4.12.14-lp150.12.79.1.x86_64" }, "product_reference": "kernel-obs-build-4.12.14-lp150.12.79.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-qa-4.12.14-lp150.12.79.1.x86_64 as component of openSUSE Leap 15.0", "product_id": "openSUSE Leap 15.0:kernel-obs-qa-4.12.14-lp150.12.79.1.x86_64" }, "product_reference": "kernel-obs-qa-4.12.14-lp150.12.79.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-4.12.14-lp150.12.79.1.noarch as component of openSUSE Leap 15.0", "product_id": "openSUSE Leap 15.0:kernel-source-4.12.14-lp150.12.79.1.noarch" }, "product_reference": "kernel-source-4.12.14-lp150.12.79.1.noarch", "relates_to_product_reference": "openSUSE Leap 15.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-vanilla-4.12.14-lp150.12.79.1.noarch as component of openSUSE Leap 15.0", "product_id": "openSUSE Leap 15.0:kernel-source-vanilla-4.12.14-lp150.12.79.1.noarch" }, "product_reference": "kernel-source-vanilla-4.12.14-lp150.12.79.1.noarch", "relates_to_product_reference": "openSUSE Leap 15.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-lp150.12.79.1.x86_64 as component of openSUSE Leap 15.0", "product_id": "openSUSE Leap 15.0:kernel-syms-4.12.14-lp150.12.79.1.x86_64" }, "product_reference": "kernel-syms-4.12.14-lp150.12.79.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-vanilla-4.12.14-lp150.12.79.1.x86_64 as component of openSUSE Leap 15.0", "product_id": "openSUSE Leap 15.0:kernel-vanilla-4.12.14-lp150.12.79.1.x86_64" }, "product_reference": "kernel-vanilla-4.12.14-lp150.12.79.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-vanilla-base-4.12.14-lp150.12.79.1.x86_64 as component of openSUSE Leap 15.0", "product_id": "openSUSE Leap 15.0:kernel-vanilla-base-4.12.14-lp150.12.79.1.x86_64" }, "product_reference": "kernel-vanilla-base-4.12.14-lp150.12.79.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-vanilla-devel-4.12.14-lp150.12.79.1.x86_64 as component of openSUSE Leap 15.0", "product_id": "openSUSE Leap 15.0:kernel-vanilla-devel-4.12.14-lp150.12.79.1.x86_64" }, "product_reference": "kernel-vanilla-devel-4.12.14-lp150.12.79.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.0" } ] }, "vulnerabilities": [ { "cve": "CVE-2019-16232", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-16232" } ], "notes": [ { "category": "general", "text": "drivers/net/wireless/marvell/libertas/if_sdio.c in the Linux kernel 5.2.14 does not check the alloc_workqueue return value, leading to a NULL pointer dereference.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.0:kernel-debug-4.12.14-lp150.12.79.1.x86_64", "openSUSE Leap 15.0:kernel-debug-base-4.12.14-lp150.12.79.1.x86_64", "openSUSE Leap 15.0:kernel-debug-devel-4.12.14-lp150.12.79.1.x86_64", "openSUSE Leap 15.0:kernel-default-4.12.14-lp150.12.79.1.x86_64", "openSUSE Leap 15.0:kernel-default-base-4.12.14-lp150.12.79.1.x86_64", "openSUSE Leap 15.0:kernel-default-devel-4.12.14-lp150.12.79.1.x86_64", "openSUSE Leap 15.0:kernel-devel-4.12.14-lp150.12.79.1.noarch", "openSUSE Leap 15.0:kernel-docs-4.12.14-lp150.12.79.1.noarch", "openSUSE Leap 15.0:kernel-docs-html-4.12.14-lp150.12.79.1.noarch", "openSUSE Leap 15.0:kernel-kvmsmall-4.12.14-lp150.12.79.1.x86_64", "openSUSE Leap 15.0:kernel-kvmsmall-base-4.12.14-lp150.12.79.1.x86_64", "openSUSE Leap 15.0:kernel-kvmsmall-devel-4.12.14-lp150.12.79.1.x86_64", "openSUSE Leap 15.0:kernel-macros-4.12.14-lp150.12.79.1.noarch", "openSUSE Leap 15.0:kernel-obs-build-4.12.14-lp150.12.79.1.x86_64", "openSUSE Leap 15.0:kernel-obs-qa-4.12.14-lp150.12.79.1.x86_64", "openSUSE Leap 15.0:kernel-source-4.12.14-lp150.12.79.1.noarch", "openSUSE Leap 15.0:kernel-source-vanilla-4.12.14-lp150.12.79.1.noarch", "openSUSE Leap 15.0:kernel-syms-4.12.14-lp150.12.79.1.x86_64", "openSUSE Leap 15.0:kernel-vanilla-4.12.14-lp150.12.79.1.x86_64", "openSUSE Leap 15.0:kernel-vanilla-base-4.12.14-lp150.12.79.1.x86_64", "openSUSE Leap 15.0:kernel-vanilla-devel-4.12.14-lp150.12.79.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-16232", "url": "https://www.suse.com/security/cve/CVE-2019-16232" }, { "category": "external", "summary": "SUSE Bug 1150465 for CVE-2019-16232", "url": "https://bugzilla.suse.com/1150465" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.0:kernel-debug-4.12.14-lp150.12.79.1.x86_64", "openSUSE Leap 15.0:kernel-debug-base-4.12.14-lp150.12.79.1.x86_64", "openSUSE Leap 15.0:kernel-debug-devel-4.12.14-lp150.12.79.1.x86_64", "openSUSE Leap 15.0:kernel-default-4.12.14-lp150.12.79.1.x86_64", "openSUSE Leap 15.0:kernel-default-base-4.12.14-lp150.12.79.1.x86_64", "openSUSE Leap 15.0:kernel-default-devel-4.12.14-lp150.12.79.1.x86_64", "openSUSE Leap 15.0:kernel-devel-4.12.14-lp150.12.79.1.noarch", "openSUSE Leap 15.0:kernel-docs-4.12.14-lp150.12.79.1.noarch", "openSUSE Leap 15.0:kernel-docs-html-4.12.14-lp150.12.79.1.noarch", "openSUSE Leap 15.0:kernel-kvmsmall-4.12.14-lp150.12.79.1.x86_64", "openSUSE Leap 15.0:kernel-kvmsmall-base-4.12.14-lp150.12.79.1.x86_64", "openSUSE Leap 15.0:kernel-kvmsmall-devel-4.12.14-lp150.12.79.1.x86_64", "openSUSE Leap 15.0:kernel-macros-4.12.14-lp150.12.79.1.noarch", "openSUSE Leap 15.0:kernel-obs-build-4.12.14-lp150.12.79.1.x86_64", "openSUSE Leap 15.0:kernel-obs-qa-4.12.14-lp150.12.79.1.x86_64", "openSUSE Leap 15.0:kernel-source-4.12.14-lp150.12.79.1.noarch", "openSUSE Leap 15.0:kernel-source-vanilla-4.12.14-lp150.12.79.1.noarch", "openSUSE Leap 15.0:kernel-syms-4.12.14-lp150.12.79.1.x86_64", "openSUSE Leap 15.0:kernel-vanilla-4.12.14-lp150.12.79.1.x86_64", "openSUSE Leap 15.0:kernel-vanilla-base-4.12.14-lp150.12.79.1.x86_64", "openSUSE Leap 15.0:kernel-vanilla-devel-4.12.14-lp150.12.79.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "openSUSE Leap 15.0:kernel-debug-4.12.14-lp150.12.79.1.x86_64", "openSUSE Leap 15.0:kernel-debug-base-4.12.14-lp150.12.79.1.x86_64", "openSUSE Leap 15.0:kernel-debug-devel-4.12.14-lp150.12.79.1.x86_64", "openSUSE Leap 15.0:kernel-default-4.12.14-lp150.12.79.1.x86_64", "openSUSE Leap 15.0:kernel-default-base-4.12.14-lp150.12.79.1.x86_64", "openSUSE Leap 15.0:kernel-default-devel-4.12.14-lp150.12.79.1.x86_64", "openSUSE Leap 15.0:kernel-devel-4.12.14-lp150.12.79.1.noarch", "openSUSE Leap 15.0:kernel-docs-4.12.14-lp150.12.79.1.noarch", "openSUSE Leap 15.0:kernel-docs-html-4.12.14-lp150.12.79.1.noarch", "openSUSE Leap 15.0:kernel-kvmsmall-4.12.14-lp150.12.79.1.x86_64", "openSUSE Leap 15.0:kernel-kvmsmall-base-4.12.14-lp150.12.79.1.x86_64", "openSUSE Leap 15.0:kernel-kvmsmall-devel-4.12.14-lp150.12.79.1.x86_64", "openSUSE Leap 15.0:kernel-macros-4.12.14-lp150.12.79.1.noarch", "openSUSE Leap 15.0:kernel-obs-build-4.12.14-lp150.12.79.1.x86_64", "openSUSE Leap 15.0:kernel-obs-qa-4.12.14-lp150.12.79.1.x86_64", "openSUSE Leap 15.0:kernel-source-4.12.14-lp150.12.79.1.noarch", "openSUSE Leap 15.0:kernel-source-vanilla-4.12.14-lp150.12.79.1.noarch", "openSUSE Leap 15.0:kernel-syms-4.12.14-lp150.12.79.1.x86_64", "openSUSE Leap 15.0:kernel-vanilla-4.12.14-lp150.12.79.1.x86_64", "openSUSE Leap 15.0:kernel-vanilla-base-4.12.14-lp150.12.79.1.x86_64", "openSUSE Leap 15.0:kernel-vanilla-devel-4.12.14-lp150.12.79.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-10-27T18:35:05Z", "details": "low" } ], "title": "CVE-2019-16232" }, { "cve": "CVE-2019-16234", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-16234" } ], "notes": [ { "category": "general", "text": "drivers/net/wireless/intel/iwlwifi/pcie/trans.c in the Linux kernel 5.2.14 does not check the alloc_workqueue return value, leading to a NULL pointer dereference.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.0:kernel-debug-4.12.14-lp150.12.79.1.x86_64", "openSUSE Leap 15.0:kernel-debug-base-4.12.14-lp150.12.79.1.x86_64", "openSUSE Leap 15.0:kernel-debug-devel-4.12.14-lp150.12.79.1.x86_64", "openSUSE Leap 15.0:kernel-default-4.12.14-lp150.12.79.1.x86_64", "openSUSE Leap 15.0:kernel-default-base-4.12.14-lp150.12.79.1.x86_64", "openSUSE Leap 15.0:kernel-default-devel-4.12.14-lp150.12.79.1.x86_64", "openSUSE Leap 15.0:kernel-devel-4.12.14-lp150.12.79.1.noarch", "openSUSE Leap 15.0:kernel-docs-4.12.14-lp150.12.79.1.noarch", "openSUSE Leap 15.0:kernel-docs-html-4.12.14-lp150.12.79.1.noarch", "openSUSE Leap 15.0:kernel-kvmsmall-4.12.14-lp150.12.79.1.x86_64", "openSUSE Leap 15.0:kernel-kvmsmall-base-4.12.14-lp150.12.79.1.x86_64", "openSUSE Leap 15.0:kernel-kvmsmall-devel-4.12.14-lp150.12.79.1.x86_64", "openSUSE Leap 15.0:kernel-macros-4.12.14-lp150.12.79.1.noarch", "openSUSE Leap 15.0:kernel-obs-build-4.12.14-lp150.12.79.1.x86_64", "openSUSE Leap 15.0:kernel-obs-qa-4.12.14-lp150.12.79.1.x86_64", "openSUSE Leap 15.0:kernel-source-4.12.14-lp150.12.79.1.noarch", "openSUSE Leap 15.0:kernel-source-vanilla-4.12.14-lp150.12.79.1.noarch", "openSUSE Leap 15.0:kernel-syms-4.12.14-lp150.12.79.1.x86_64", "openSUSE Leap 15.0:kernel-vanilla-4.12.14-lp150.12.79.1.x86_64", "openSUSE Leap 15.0:kernel-vanilla-base-4.12.14-lp150.12.79.1.x86_64", "openSUSE Leap 15.0:kernel-vanilla-devel-4.12.14-lp150.12.79.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-16234", "url": "https://www.suse.com/security/cve/CVE-2019-16234" }, { "category": "external", "summary": "SUSE Bug 1150452 for CVE-2019-16234", "url": "https://bugzilla.suse.com/1150452" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.0:kernel-debug-4.12.14-lp150.12.79.1.x86_64", "openSUSE Leap 15.0:kernel-debug-base-4.12.14-lp150.12.79.1.x86_64", "openSUSE Leap 15.0:kernel-debug-devel-4.12.14-lp150.12.79.1.x86_64", "openSUSE Leap 15.0:kernel-default-4.12.14-lp150.12.79.1.x86_64", "openSUSE Leap 15.0:kernel-default-base-4.12.14-lp150.12.79.1.x86_64", "openSUSE Leap 15.0:kernel-default-devel-4.12.14-lp150.12.79.1.x86_64", "openSUSE Leap 15.0:kernel-devel-4.12.14-lp150.12.79.1.noarch", "openSUSE Leap 15.0:kernel-docs-4.12.14-lp150.12.79.1.noarch", "openSUSE Leap 15.0:kernel-docs-html-4.12.14-lp150.12.79.1.noarch", "openSUSE Leap 15.0:kernel-kvmsmall-4.12.14-lp150.12.79.1.x86_64", "openSUSE Leap 15.0:kernel-kvmsmall-base-4.12.14-lp150.12.79.1.x86_64", "openSUSE Leap 15.0:kernel-kvmsmall-devel-4.12.14-lp150.12.79.1.x86_64", "openSUSE Leap 15.0:kernel-macros-4.12.14-lp150.12.79.1.noarch", "openSUSE Leap 15.0:kernel-obs-build-4.12.14-lp150.12.79.1.x86_64", "openSUSE Leap 15.0:kernel-obs-qa-4.12.14-lp150.12.79.1.x86_64", "openSUSE Leap 15.0:kernel-source-4.12.14-lp150.12.79.1.noarch", "openSUSE Leap 15.0:kernel-source-vanilla-4.12.14-lp150.12.79.1.noarch", "openSUSE Leap 15.0:kernel-syms-4.12.14-lp150.12.79.1.x86_64", "openSUSE Leap 15.0:kernel-vanilla-4.12.14-lp150.12.79.1.x86_64", "openSUSE Leap 15.0:kernel-vanilla-base-4.12.14-lp150.12.79.1.x86_64", "openSUSE Leap 15.0:kernel-vanilla-devel-4.12.14-lp150.12.79.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "openSUSE Leap 15.0:kernel-debug-4.12.14-lp150.12.79.1.x86_64", "openSUSE Leap 15.0:kernel-debug-base-4.12.14-lp150.12.79.1.x86_64", "openSUSE Leap 15.0:kernel-debug-devel-4.12.14-lp150.12.79.1.x86_64", "openSUSE Leap 15.0:kernel-default-4.12.14-lp150.12.79.1.x86_64", "openSUSE Leap 15.0:kernel-default-base-4.12.14-lp150.12.79.1.x86_64", "openSUSE Leap 15.0:kernel-default-devel-4.12.14-lp150.12.79.1.x86_64", "openSUSE Leap 15.0:kernel-devel-4.12.14-lp150.12.79.1.noarch", "openSUSE Leap 15.0:kernel-docs-4.12.14-lp150.12.79.1.noarch", "openSUSE Leap 15.0:kernel-docs-html-4.12.14-lp150.12.79.1.noarch", "openSUSE Leap 15.0:kernel-kvmsmall-4.12.14-lp150.12.79.1.x86_64", "openSUSE Leap 15.0:kernel-kvmsmall-base-4.12.14-lp150.12.79.1.x86_64", "openSUSE Leap 15.0:kernel-kvmsmall-devel-4.12.14-lp150.12.79.1.x86_64", "openSUSE Leap 15.0:kernel-macros-4.12.14-lp150.12.79.1.noarch", "openSUSE Leap 15.0:kernel-obs-build-4.12.14-lp150.12.79.1.x86_64", "openSUSE Leap 15.0:kernel-obs-qa-4.12.14-lp150.12.79.1.x86_64", "openSUSE Leap 15.0:kernel-source-4.12.14-lp150.12.79.1.noarch", "openSUSE Leap 15.0:kernel-source-vanilla-4.12.14-lp150.12.79.1.noarch", "openSUSE Leap 15.0:kernel-syms-4.12.14-lp150.12.79.1.x86_64", "openSUSE Leap 15.0:kernel-vanilla-4.12.14-lp150.12.79.1.x86_64", "openSUSE Leap 15.0:kernel-vanilla-base-4.12.14-lp150.12.79.1.x86_64", "openSUSE Leap 15.0:kernel-vanilla-devel-4.12.14-lp150.12.79.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-10-27T18:35:05Z", "details": "low" } ], "title": "CVE-2019-16234" }, { "cve": "CVE-2019-17056", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-17056" } ], "notes": [ { "category": "general", "text": "llcp_sock_create in net/nfc/llcp_sock.c in the AF_NFC network module in the Linux kernel through 5.3.2 does not enforce CAP_NET_RAW, which means that unprivileged users can create a raw socket, aka CID-3a359798b176.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.0:kernel-debug-4.12.14-lp150.12.79.1.x86_64", "openSUSE Leap 15.0:kernel-debug-base-4.12.14-lp150.12.79.1.x86_64", "openSUSE Leap 15.0:kernel-debug-devel-4.12.14-lp150.12.79.1.x86_64", "openSUSE Leap 15.0:kernel-default-4.12.14-lp150.12.79.1.x86_64", "openSUSE Leap 15.0:kernel-default-base-4.12.14-lp150.12.79.1.x86_64", "openSUSE Leap 15.0:kernel-default-devel-4.12.14-lp150.12.79.1.x86_64", "openSUSE Leap 15.0:kernel-devel-4.12.14-lp150.12.79.1.noarch", "openSUSE Leap 15.0:kernel-docs-4.12.14-lp150.12.79.1.noarch", "openSUSE Leap 15.0:kernel-docs-html-4.12.14-lp150.12.79.1.noarch", "openSUSE Leap 15.0:kernel-kvmsmall-4.12.14-lp150.12.79.1.x86_64", "openSUSE Leap 15.0:kernel-kvmsmall-base-4.12.14-lp150.12.79.1.x86_64", "openSUSE Leap 15.0:kernel-kvmsmall-devel-4.12.14-lp150.12.79.1.x86_64", "openSUSE Leap 15.0:kernel-macros-4.12.14-lp150.12.79.1.noarch", "openSUSE Leap 15.0:kernel-obs-build-4.12.14-lp150.12.79.1.x86_64", "openSUSE Leap 15.0:kernel-obs-qa-4.12.14-lp150.12.79.1.x86_64", "openSUSE Leap 15.0:kernel-source-4.12.14-lp150.12.79.1.noarch", "openSUSE Leap 15.0:kernel-source-vanilla-4.12.14-lp150.12.79.1.noarch", "openSUSE Leap 15.0:kernel-syms-4.12.14-lp150.12.79.1.x86_64", "openSUSE Leap 15.0:kernel-vanilla-4.12.14-lp150.12.79.1.x86_64", "openSUSE Leap 15.0:kernel-vanilla-base-4.12.14-lp150.12.79.1.x86_64", "openSUSE Leap 15.0:kernel-vanilla-devel-4.12.14-lp150.12.79.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-17056", "url": "https://www.suse.com/security/cve/CVE-2019-17056" }, { "category": "external", "summary": "SUSE Bug 1152788 for CVE-2019-17056", "url": "https://bugzilla.suse.com/1152788" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.0:kernel-debug-4.12.14-lp150.12.79.1.x86_64", "openSUSE Leap 15.0:kernel-debug-base-4.12.14-lp150.12.79.1.x86_64", "openSUSE Leap 15.0:kernel-debug-devel-4.12.14-lp150.12.79.1.x86_64", "openSUSE Leap 15.0:kernel-default-4.12.14-lp150.12.79.1.x86_64", "openSUSE Leap 15.0:kernel-default-base-4.12.14-lp150.12.79.1.x86_64", "openSUSE Leap 15.0:kernel-default-devel-4.12.14-lp150.12.79.1.x86_64", "openSUSE Leap 15.0:kernel-devel-4.12.14-lp150.12.79.1.noarch", "openSUSE Leap 15.0:kernel-docs-4.12.14-lp150.12.79.1.noarch", "openSUSE Leap 15.0:kernel-docs-html-4.12.14-lp150.12.79.1.noarch", "openSUSE Leap 15.0:kernel-kvmsmall-4.12.14-lp150.12.79.1.x86_64", "openSUSE Leap 15.0:kernel-kvmsmall-base-4.12.14-lp150.12.79.1.x86_64", "openSUSE Leap 15.0:kernel-kvmsmall-devel-4.12.14-lp150.12.79.1.x86_64", "openSUSE Leap 15.0:kernel-macros-4.12.14-lp150.12.79.1.noarch", "openSUSE Leap 15.0:kernel-obs-build-4.12.14-lp150.12.79.1.x86_64", "openSUSE Leap 15.0:kernel-obs-qa-4.12.14-lp150.12.79.1.x86_64", "openSUSE Leap 15.0:kernel-source-4.12.14-lp150.12.79.1.noarch", "openSUSE Leap 15.0:kernel-source-vanilla-4.12.14-lp150.12.79.1.noarch", "openSUSE Leap 15.0:kernel-syms-4.12.14-lp150.12.79.1.x86_64", "openSUSE Leap 15.0:kernel-vanilla-4.12.14-lp150.12.79.1.x86_64", "openSUSE Leap 15.0:kernel-vanilla-base-4.12.14-lp150.12.79.1.x86_64", "openSUSE Leap 15.0:kernel-vanilla-devel-4.12.14-lp150.12.79.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "products": [ "openSUSE Leap 15.0:kernel-debug-4.12.14-lp150.12.79.1.x86_64", "openSUSE Leap 15.0:kernel-debug-base-4.12.14-lp150.12.79.1.x86_64", "openSUSE Leap 15.0:kernel-debug-devel-4.12.14-lp150.12.79.1.x86_64", "openSUSE Leap 15.0:kernel-default-4.12.14-lp150.12.79.1.x86_64", "openSUSE Leap 15.0:kernel-default-base-4.12.14-lp150.12.79.1.x86_64", "openSUSE Leap 15.0:kernel-default-devel-4.12.14-lp150.12.79.1.x86_64", "openSUSE Leap 15.0:kernel-devel-4.12.14-lp150.12.79.1.noarch", "openSUSE Leap 15.0:kernel-docs-4.12.14-lp150.12.79.1.noarch", "openSUSE Leap 15.0:kernel-docs-html-4.12.14-lp150.12.79.1.noarch", "openSUSE Leap 15.0:kernel-kvmsmall-4.12.14-lp150.12.79.1.x86_64", "openSUSE Leap 15.0:kernel-kvmsmall-base-4.12.14-lp150.12.79.1.x86_64", "openSUSE Leap 15.0:kernel-kvmsmall-devel-4.12.14-lp150.12.79.1.x86_64", "openSUSE Leap 15.0:kernel-macros-4.12.14-lp150.12.79.1.noarch", "openSUSE Leap 15.0:kernel-obs-build-4.12.14-lp150.12.79.1.x86_64", "openSUSE Leap 15.0:kernel-obs-qa-4.12.14-lp150.12.79.1.x86_64", "openSUSE Leap 15.0:kernel-source-4.12.14-lp150.12.79.1.noarch", "openSUSE Leap 15.0:kernel-source-vanilla-4.12.14-lp150.12.79.1.noarch", "openSUSE Leap 15.0:kernel-syms-4.12.14-lp150.12.79.1.x86_64", "openSUSE Leap 15.0:kernel-vanilla-4.12.14-lp150.12.79.1.x86_64", "openSUSE Leap 15.0:kernel-vanilla-base-4.12.14-lp150.12.79.1.x86_64", "openSUSE Leap 15.0:kernel-vanilla-devel-4.12.14-lp150.12.79.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-10-27T18:35:05Z", "details": "moderate" } ], "title": "CVE-2019-17056" }, { "cve": "CVE-2019-17133", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-17133" } ], "notes": [ { "category": "general", "text": "In the Linux kernel through 5.3.2, cfg80211_mgd_wext_giwessid in net/wireless/wext-sme.c does not reject a long SSID IE, leading to a Buffer Overflow.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.0:kernel-debug-4.12.14-lp150.12.79.1.x86_64", "openSUSE Leap 15.0:kernel-debug-base-4.12.14-lp150.12.79.1.x86_64", "openSUSE Leap 15.0:kernel-debug-devel-4.12.14-lp150.12.79.1.x86_64", "openSUSE Leap 15.0:kernel-default-4.12.14-lp150.12.79.1.x86_64", "openSUSE Leap 15.0:kernel-default-base-4.12.14-lp150.12.79.1.x86_64", "openSUSE Leap 15.0:kernel-default-devel-4.12.14-lp150.12.79.1.x86_64", "openSUSE Leap 15.0:kernel-devel-4.12.14-lp150.12.79.1.noarch", "openSUSE Leap 15.0:kernel-docs-4.12.14-lp150.12.79.1.noarch", "openSUSE Leap 15.0:kernel-docs-html-4.12.14-lp150.12.79.1.noarch", "openSUSE Leap 15.0:kernel-kvmsmall-4.12.14-lp150.12.79.1.x86_64", "openSUSE Leap 15.0:kernel-kvmsmall-base-4.12.14-lp150.12.79.1.x86_64", "openSUSE Leap 15.0:kernel-kvmsmall-devel-4.12.14-lp150.12.79.1.x86_64", "openSUSE Leap 15.0:kernel-macros-4.12.14-lp150.12.79.1.noarch", "openSUSE Leap 15.0:kernel-obs-build-4.12.14-lp150.12.79.1.x86_64", "openSUSE Leap 15.0:kernel-obs-qa-4.12.14-lp150.12.79.1.x86_64", "openSUSE Leap 15.0:kernel-source-4.12.14-lp150.12.79.1.noarch", "openSUSE Leap 15.0:kernel-source-vanilla-4.12.14-lp150.12.79.1.noarch", "openSUSE Leap 15.0:kernel-syms-4.12.14-lp150.12.79.1.x86_64", "openSUSE Leap 15.0:kernel-vanilla-4.12.14-lp150.12.79.1.x86_64", "openSUSE Leap 15.0:kernel-vanilla-base-4.12.14-lp150.12.79.1.x86_64", "openSUSE Leap 15.0:kernel-vanilla-devel-4.12.14-lp150.12.79.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-17133", "url": "https://www.suse.com/security/cve/CVE-2019-17133" }, { "category": "external", "summary": "SUSE Bug 1153158 for CVE-2019-17133", "url": "https://bugzilla.suse.com/1153158" }, { "category": "external", "summary": "SUSE Bug 1153161 for CVE-2019-17133", "url": "https://bugzilla.suse.com/1153161" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.0:kernel-debug-4.12.14-lp150.12.79.1.x86_64", "openSUSE Leap 15.0:kernel-debug-base-4.12.14-lp150.12.79.1.x86_64", "openSUSE Leap 15.0:kernel-debug-devel-4.12.14-lp150.12.79.1.x86_64", "openSUSE Leap 15.0:kernel-default-4.12.14-lp150.12.79.1.x86_64", "openSUSE Leap 15.0:kernel-default-base-4.12.14-lp150.12.79.1.x86_64", "openSUSE Leap 15.0:kernel-default-devel-4.12.14-lp150.12.79.1.x86_64", "openSUSE Leap 15.0:kernel-devel-4.12.14-lp150.12.79.1.noarch", "openSUSE Leap 15.0:kernel-docs-4.12.14-lp150.12.79.1.noarch", "openSUSE Leap 15.0:kernel-docs-html-4.12.14-lp150.12.79.1.noarch", "openSUSE Leap 15.0:kernel-kvmsmall-4.12.14-lp150.12.79.1.x86_64", "openSUSE Leap 15.0:kernel-kvmsmall-base-4.12.14-lp150.12.79.1.x86_64", "openSUSE Leap 15.0:kernel-kvmsmall-devel-4.12.14-lp150.12.79.1.x86_64", "openSUSE Leap 15.0:kernel-macros-4.12.14-lp150.12.79.1.noarch", "openSUSE Leap 15.0:kernel-obs-build-4.12.14-lp150.12.79.1.x86_64", "openSUSE Leap 15.0:kernel-obs-qa-4.12.14-lp150.12.79.1.x86_64", "openSUSE Leap 15.0:kernel-source-4.12.14-lp150.12.79.1.noarch", "openSUSE Leap 15.0:kernel-source-vanilla-4.12.14-lp150.12.79.1.noarch", "openSUSE Leap 15.0:kernel-syms-4.12.14-lp150.12.79.1.x86_64", "openSUSE Leap 15.0:kernel-vanilla-4.12.14-lp150.12.79.1.x86_64", "openSUSE Leap 15.0:kernel-vanilla-base-4.12.14-lp150.12.79.1.x86_64", "openSUSE Leap 15.0:kernel-vanilla-devel-4.12.14-lp150.12.79.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Leap 15.0:kernel-debug-4.12.14-lp150.12.79.1.x86_64", "openSUSE Leap 15.0:kernel-debug-base-4.12.14-lp150.12.79.1.x86_64", "openSUSE Leap 15.0:kernel-debug-devel-4.12.14-lp150.12.79.1.x86_64", "openSUSE Leap 15.0:kernel-default-4.12.14-lp150.12.79.1.x86_64", "openSUSE Leap 15.0:kernel-default-base-4.12.14-lp150.12.79.1.x86_64", "openSUSE Leap 15.0:kernel-default-devel-4.12.14-lp150.12.79.1.x86_64", "openSUSE Leap 15.0:kernel-devel-4.12.14-lp150.12.79.1.noarch", "openSUSE Leap 15.0:kernel-docs-4.12.14-lp150.12.79.1.noarch", "openSUSE Leap 15.0:kernel-docs-html-4.12.14-lp150.12.79.1.noarch", "openSUSE Leap 15.0:kernel-kvmsmall-4.12.14-lp150.12.79.1.x86_64", "openSUSE Leap 15.0:kernel-kvmsmall-base-4.12.14-lp150.12.79.1.x86_64", "openSUSE Leap 15.0:kernel-kvmsmall-devel-4.12.14-lp150.12.79.1.x86_64", "openSUSE Leap 15.0:kernel-macros-4.12.14-lp150.12.79.1.noarch", "openSUSE Leap 15.0:kernel-obs-build-4.12.14-lp150.12.79.1.x86_64", "openSUSE Leap 15.0:kernel-obs-qa-4.12.14-lp150.12.79.1.x86_64", "openSUSE Leap 15.0:kernel-source-4.12.14-lp150.12.79.1.noarch", "openSUSE Leap 15.0:kernel-source-vanilla-4.12.14-lp150.12.79.1.noarch", "openSUSE Leap 15.0:kernel-syms-4.12.14-lp150.12.79.1.x86_64", "openSUSE Leap 15.0:kernel-vanilla-4.12.14-lp150.12.79.1.x86_64", "openSUSE Leap 15.0:kernel-vanilla-base-4.12.14-lp150.12.79.1.x86_64", "openSUSE Leap 15.0:kernel-vanilla-devel-4.12.14-lp150.12.79.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-10-27T18:35:05Z", "details": "important" } ], "title": "CVE-2019-17133" }, { "cve": "CVE-2019-17666", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-17666" } ], "notes": [ { "category": "general", "text": "rtl_p2p_noa_ie in drivers/net/wireless/realtek/rtlwifi/ps.c in the Linux kernel through 5.3.6 lacks a certain upper-bound check, leading to a buffer overflow.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.0:kernel-debug-4.12.14-lp150.12.79.1.x86_64", "openSUSE Leap 15.0:kernel-debug-base-4.12.14-lp150.12.79.1.x86_64", "openSUSE Leap 15.0:kernel-debug-devel-4.12.14-lp150.12.79.1.x86_64", "openSUSE Leap 15.0:kernel-default-4.12.14-lp150.12.79.1.x86_64", "openSUSE Leap 15.0:kernel-default-base-4.12.14-lp150.12.79.1.x86_64", "openSUSE Leap 15.0:kernel-default-devel-4.12.14-lp150.12.79.1.x86_64", "openSUSE Leap 15.0:kernel-devel-4.12.14-lp150.12.79.1.noarch", "openSUSE Leap 15.0:kernel-docs-4.12.14-lp150.12.79.1.noarch", "openSUSE Leap 15.0:kernel-docs-html-4.12.14-lp150.12.79.1.noarch", "openSUSE Leap 15.0:kernel-kvmsmall-4.12.14-lp150.12.79.1.x86_64", "openSUSE Leap 15.0:kernel-kvmsmall-base-4.12.14-lp150.12.79.1.x86_64", "openSUSE Leap 15.0:kernel-kvmsmall-devel-4.12.14-lp150.12.79.1.x86_64", "openSUSE Leap 15.0:kernel-macros-4.12.14-lp150.12.79.1.noarch", "openSUSE Leap 15.0:kernel-obs-build-4.12.14-lp150.12.79.1.x86_64", "openSUSE Leap 15.0:kernel-obs-qa-4.12.14-lp150.12.79.1.x86_64", "openSUSE Leap 15.0:kernel-source-4.12.14-lp150.12.79.1.noarch", "openSUSE Leap 15.0:kernel-source-vanilla-4.12.14-lp150.12.79.1.noarch", "openSUSE Leap 15.0:kernel-syms-4.12.14-lp150.12.79.1.x86_64", "openSUSE Leap 15.0:kernel-vanilla-4.12.14-lp150.12.79.1.x86_64", "openSUSE Leap 15.0:kernel-vanilla-base-4.12.14-lp150.12.79.1.x86_64", "openSUSE Leap 15.0:kernel-vanilla-devel-4.12.14-lp150.12.79.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-17666", "url": "https://www.suse.com/security/cve/CVE-2019-17666" }, { "category": "external", "summary": "SUSE Bug 1154372 for CVE-2019-17666", "url": "https://bugzilla.suse.com/1154372" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.0:kernel-debug-4.12.14-lp150.12.79.1.x86_64", "openSUSE Leap 15.0:kernel-debug-base-4.12.14-lp150.12.79.1.x86_64", "openSUSE Leap 15.0:kernel-debug-devel-4.12.14-lp150.12.79.1.x86_64", "openSUSE Leap 15.0:kernel-default-4.12.14-lp150.12.79.1.x86_64", "openSUSE Leap 15.0:kernel-default-base-4.12.14-lp150.12.79.1.x86_64", "openSUSE Leap 15.0:kernel-default-devel-4.12.14-lp150.12.79.1.x86_64", "openSUSE Leap 15.0:kernel-devel-4.12.14-lp150.12.79.1.noarch", "openSUSE Leap 15.0:kernel-docs-4.12.14-lp150.12.79.1.noarch", "openSUSE Leap 15.0:kernel-docs-html-4.12.14-lp150.12.79.1.noarch", "openSUSE Leap 15.0:kernel-kvmsmall-4.12.14-lp150.12.79.1.x86_64", "openSUSE Leap 15.0:kernel-kvmsmall-base-4.12.14-lp150.12.79.1.x86_64", "openSUSE Leap 15.0:kernel-kvmsmall-devel-4.12.14-lp150.12.79.1.x86_64", "openSUSE Leap 15.0:kernel-macros-4.12.14-lp150.12.79.1.noarch", "openSUSE Leap 15.0:kernel-obs-build-4.12.14-lp150.12.79.1.x86_64", "openSUSE Leap 15.0:kernel-obs-qa-4.12.14-lp150.12.79.1.x86_64", "openSUSE Leap 15.0:kernel-source-4.12.14-lp150.12.79.1.noarch", "openSUSE Leap 15.0:kernel-source-vanilla-4.12.14-lp150.12.79.1.noarch", "openSUSE Leap 15.0:kernel-syms-4.12.14-lp150.12.79.1.x86_64", "openSUSE Leap 15.0:kernel-vanilla-4.12.14-lp150.12.79.1.x86_64", "openSUSE Leap 15.0:kernel-vanilla-base-4.12.14-lp150.12.79.1.x86_64", "openSUSE Leap 15.0:kernel-vanilla-devel-4.12.14-lp150.12.79.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L", "version": "3.0" }, "products": [ "openSUSE Leap 15.0:kernel-debug-4.12.14-lp150.12.79.1.x86_64", "openSUSE Leap 15.0:kernel-debug-base-4.12.14-lp150.12.79.1.x86_64", "openSUSE Leap 15.0:kernel-debug-devel-4.12.14-lp150.12.79.1.x86_64", "openSUSE Leap 15.0:kernel-default-4.12.14-lp150.12.79.1.x86_64", "openSUSE Leap 15.0:kernel-default-base-4.12.14-lp150.12.79.1.x86_64", "openSUSE Leap 15.0:kernel-default-devel-4.12.14-lp150.12.79.1.x86_64", "openSUSE Leap 15.0:kernel-devel-4.12.14-lp150.12.79.1.noarch", "openSUSE Leap 15.0:kernel-docs-4.12.14-lp150.12.79.1.noarch", "openSUSE Leap 15.0:kernel-docs-html-4.12.14-lp150.12.79.1.noarch", "openSUSE Leap 15.0:kernel-kvmsmall-4.12.14-lp150.12.79.1.x86_64", "openSUSE Leap 15.0:kernel-kvmsmall-base-4.12.14-lp150.12.79.1.x86_64", "openSUSE Leap 15.0:kernel-kvmsmall-devel-4.12.14-lp150.12.79.1.x86_64", "openSUSE Leap 15.0:kernel-macros-4.12.14-lp150.12.79.1.noarch", "openSUSE Leap 15.0:kernel-obs-build-4.12.14-lp150.12.79.1.x86_64", "openSUSE Leap 15.0:kernel-obs-qa-4.12.14-lp150.12.79.1.x86_64", "openSUSE Leap 15.0:kernel-source-4.12.14-lp150.12.79.1.noarch", "openSUSE Leap 15.0:kernel-source-vanilla-4.12.14-lp150.12.79.1.noarch", "openSUSE Leap 15.0:kernel-syms-4.12.14-lp150.12.79.1.x86_64", "openSUSE Leap 15.0:kernel-vanilla-4.12.14-lp150.12.79.1.x86_64", "openSUSE Leap 15.0:kernel-vanilla-base-4.12.14-lp150.12.79.1.x86_64", "openSUSE Leap 15.0:kernel-vanilla-devel-4.12.14-lp150.12.79.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-10-27T18:35:05Z", "details": "moderate" } ], "title": "CVE-2019-17666" } ] }
rhsa-2020_1769
Vulnerability from csaf_redhat
Published
2020-04-28 15:43
Modified
2024-11-15 11:44
Summary
Red Hat Security Advisory: kernel security, bug fix, and enhancement update
Notes
Topic
An update for kernel is now available for Red Hat Enterprise Linux 8.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: use-after-free in __blk_add_trace in kernel/trace/blktrace.c (CVE-2019-19768)
* kernel: nfs: NULL pointer dereference due to an anomalized NFS message sequence (CVE-2018-16871)
* kernel: memory leak in the kernel_read_file function in fs/exec.c allows to cause a denial of service (CVE-2019-8980)
* kernel: unprivileged users able to create RAW sockets in AF_IEEE802154 network protocol. (CVE-2019-17053)
* kernel: unprivileged users able to create RAW sockets in AF_ISDN network protocol. (CVE-2019-17055)
* kernel: integer overflow in tcp_ack_update_rtt in net/ipv4/tcp_input.c (CVE-2019-18805)
* kernel: information leak bug caused by a malicious USB device in the drivers/net/can/usb/peak_usb/pcan_usb_core.c driver (CVE-2019-19534)
* kernel: some ipv6 protocols not encrypted over ipsec tunnel. (CVE-2020-1749)
* Kernel: net: using kernel space address bits to derive IP ID may potentially break KASLR (CVE-2019-10639)
* kernel: An out-of-bounds read in drivers/scsi/qedi/qedi_dbg.c leading to crash or information disclosure (CVE-2019-15090)
* kernel: a NULL pointer dereference in drivers/net/wireless/ath/ath10k/usb.c leads to a crash (CVE-2019-15099)
* kernel: Null pointer dereference in the sound/usb/line6/pcm.c (CVE-2019-15221)
* kernel: Two memory leaks in the mwifiex_pcie_init_evt_ring() function in drivers/net/wireless/marvell/mwifiex/pcie.c allows for a DoS (CVE-2019-19057)
* kernel: Memory leaks in drivers/net/wireless/ath/ath9k/htc_hst.c in the Linux kernel (DOS) (CVE-2019-19073)
* kernel: a memory leak in the ath9k management function in allows local DoS (CVE-2019-19074)
* kernel: when cpu.cfs_quota_us is used allows attackers to cause a denial of service against non-cpu-bound applications (CVE-2019-19922)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
This update also fixes several bugs and adds various enhancements. Documentation for these changes is available from the Release Notes document linked to in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for kernel is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* kernel: use-after-free in __blk_add_trace in kernel/trace/blktrace.c (CVE-2019-19768)\n\n* kernel: nfs: NULL pointer dereference due to an anomalized NFS message sequence (CVE-2018-16871)\n\n* kernel: memory leak in the kernel_read_file function in fs/exec.c allows to cause a denial of service (CVE-2019-8980)\n\n* kernel: unprivileged users able to create RAW sockets in AF_IEEE802154 network protocol. (CVE-2019-17053)\n\n* kernel: unprivileged users able to create RAW sockets in AF_ISDN network protocol. (CVE-2019-17055)\n\n* kernel: integer overflow in tcp_ack_update_rtt in net/ipv4/tcp_input.c (CVE-2019-18805)\n\n* kernel: information leak bug caused by a malicious USB device in the drivers/net/can/usb/peak_usb/pcan_usb_core.c driver (CVE-2019-19534)\n\n* kernel: some ipv6 protocols not encrypted over ipsec tunnel. (CVE-2020-1749)\n\n* Kernel: net: using kernel space address bits to derive IP ID may potentially break KASLR (CVE-2019-10639)\n\n* kernel: An out-of-bounds read in drivers/scsi/qedi/qedi_dbg.c leading to crash or information disclosure (CVE-2019-15090)\n\n* kernel: a NULL pointer dereference in drivers/net/wireless/ath/ath10k/usb.c leads to a crash (CVE-2019-15099)\n\n* kernel: Null pointer dereference in the sound/usb/line6/pcm.c (CVE-2019-15221)\n\n* kernel: Two memory leaks in the mwifiex_pcie_init_evt_ring() function in drivers/net/wireless/marvell/mwifiex/pcie.c allows for a DoS (CVE-2019-19057)\n\n* kernel: Memory leaks in drivers/net/wireless/ath/ath9k/htc_hst.c in the Linux kernel (DOS) (CVE-2019-19073)\n\n* kernel: a memory leak in the ath9k management function in allows local DoS (CVE-2019-19074)\n\n* kernel: when cpu.cfs_quota_us is used allows attackers to cause a denial of service against non-cpu-bound applications (CVE-2019-19922)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nThis update also fixes several bugs and adds various enhancements. Documentation for these changes is available from the Release Notes document linked to in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2020:1769", "url": "https://access.redhat.com/errata/RHSA-2020:1769" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/8/html/8.2_release_notes/index", "url": "https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/8/html/8.2_release_notes/index" }, { "category": "external", "summary": "1655162", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1655162" }, { "category": "external", "summary": "1679972", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1679972" }, { "category": "external", "summary": "1729933", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1729933" }, { "category": "external", "summary": "1738741", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1738741" }, { "category": "external", "summary": "1743526", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1743526" }, { "category": "external", "summary": "1743560", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1743560" }, { "category": "external", "summary": "1749633", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1749633" }, { "category": "external", "summary": "1749974", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1749974" }, { "category": "external", "summary": "1752765", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1752765" }, { "category": "external", "summary": "1757902", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1757902" }, { "category": "external", "summary": "1758242", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1758242" }, { "category": "external", "summary": "1758248", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1758248" }, { "category": "external", "summary": "1765547", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1765547" }, { "category": "external", "summary": "1767664", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1767664" }, { "category": "external", "summary": "1771430", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1771430" }, { "category": "external", "summary": "1771496", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1771496" }, { "category": "external", "summary": "1771691", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1771691" }, { "category": "external", "summary": "1774933", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1774933" }, { "category": "external", "summary": "1774937", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1774937" }, { "category": "external", "summary": "1775050", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1775050" }, { "category": "external", "summary": "1783540", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1783540" }, { "category": "external", "summary": "1786164", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1786164" }, { "category": "external", "summary": "1789594", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1789594" }, { "category": "external", "summary": "1792512", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1792512" }, { "category": "external", "summary": "1795049", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1795049" }, { "category": "external", "summary": "1803162", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1803162" }, { "category": "external", "summary": "1809833", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1809833" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2020/rhsa-2020_1769.json" } ], "title": "Red Hat Security Advisory: kernel security, bug fix, and enhancement update", "tracking": { "current_release_date": "2024-11-15T11:44:44+00:00", "generator": { "date": "2024-11-15T11:44:44+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2020:1769", "initial_release_date": "2020-04-28T15:43:14+00:00", "revision_history": [ { "date": "2020-04-28T15:43:14+00:00", "number": "1", "summary": "Initial version" }, { "date": "2020-04-28T15:43:14+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-15T11:44:44+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat CodeReady Linux Builder (v. 8)", "product": { "name": "Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.GA", "product_identification_helper": { "cpe": "cpe:/a:redhat:enterprise_linux:8::crb" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux BaseOS (v. 8)", "product": { "name": "Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.GA", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:8::baseos" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "product": { "name": "kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "product_id": "kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-libs-devel@4.18.0-193.el8?arch=aarch64" } } }, { "category": "product_version", "name": "bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "product": { "name": "bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "product_id": "bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-193.el8?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "product": { "name": "kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "product_id": "kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-193.el8?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:4.18.0-193.el8.aarch64", "product": { "name": "kernel-debuginfo-0:4.18.0-193.el8.aarch64", "product_id": "kernel-debuginfo-0:4.18.0-193.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-193.el8?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "product": { "name": "kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "product_id": "kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common-aarch64@4.18.0-193.el8?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "product": { "name": "kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "product_id": "kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-193.el8?arch=aarch64" } } }, { "category": "product_version", "name": "perf-debuginfo-0:4.18.0-193.el8.aarch64", "product": { "name": "perf-debuginfo-0:4.18.0-193.el8.aarch64", "product_id": "perf-debuginfo-0:4.18.0-193.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-193.el8?arch=aarch64" } } }, { "category": "product_version", "name": "python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "product": { "name": "python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "product_id": "python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-193.el8?arch=aarch64" } } }, { "category": "product_version", "name": "bpftool-0:4.18.0-193.el8.aarch64", "product": { "name": "bpftool-0:4.18.0-193.el8.aarch64", "product_id": "bpftool-0:4.18.0-193.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bpftool@4.18.0-193.el8?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-0:4.18.0-193.el8.aarch64", "product": { "name": "kernel-0:4.18.0-193.el8.aarch64", "product_id": "kernel-0:4.18.0-193.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@4.18.0-193.el8?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-core-0:4.18.0-193.el8.aarch64", "product": { "name": "kernel-core-0:4.18.0-193.el8.aarch64", "product_id": "kernel-core-0:4.18.0-193.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-core@4.18.0-193.el8?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-cross-headers-0:4.18.0-193.el8.aarch64", "product": { "name": "kernel-cross-headers-0:4.18.0-193.el8.aarch64", "product_id": "kernel-cross-headers-0:4.18.0-193.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-193.el8?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-debug-0:4.18.0-193.el8.aarch64", "product": { "name": "kernel-debug-0:4.18.0-193.el8.aarch64", "product_id": "kernel-debug-0:4.18.0-193.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@4.18.0-193.el8?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-debug-core-0:4.18.0-193.el8.aarch64", "product": { "name": "kernel-debug-core-0:4.18.0-193.el8.aarch64", "product_id": "kernel-debug-core-0:4.18.0-193.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-193.el8?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:4.18.0-193.el8.aarch64", "product": { "name": "kernel-debug-devel-0:4.18.0-193.el8.aarch64", "product_id": "kernel-debug-devel-0:4.18.0-193.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-193.el8?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-debug-modules-0:4.18.0-193.el8.aarch64", "product": { "name": "kernel-debug-modules-0:4.18.0-193.el8.aarch64", "product_id": "kernel-debug-modules-0:4.18.0-193.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-193.el8?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "product": { "name": "kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "product_id": "kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-193.el8?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-devel-0:4.18.0-193.el8.aarch64", "product": { "name": "kernel-devel-0:4.18.0-193.el8.aarch64", "product_id": "kernel-devel-0:4.18.0-193.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@4.18.0-193.el8?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-headers-0:4.18.0-193.el8.aarch64", "product": { "name": "kernel-headers-0:4.18.0-193.el8.aarch64", "product_id": "kernel-headers-0:4.18.0-193.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@4.18.0-193.el8?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-modules-0:4.18.0-193.el8.aarch64", "product": { "name": "kernel-modules-0:4.18.0-193.el8.aarch64", "product_id": "kernel-modules-0:4.18.0-193.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-modules@4.18.0-193.el8?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-modules-extra-0:4.18.0-193.el8.aarch64", "product": { "name": "kernel-modules-extra-0:4.18.0-193.el8.aarch64", "product_id": "kernel-modules-extra-0:4.18.0-193.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-193.el8?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-tools-0:4.18.0-193.el8.aarch64", "product": { "name": "kernel-tools-0:4.18.0-193.el8.aarch64", "product_id": "kernel-tools-0:4.18.0-193.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools@4.18.0-193.el8?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-tools-libs-0:4.18.0-193.el8.aarch64", "product": { "name": "kernel-tools-libs-0:4.18.0-193.el8.aarch64", "product_id": "kernel-tools-libs-0:4.18.0-193.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-libs@4.18.0-193.el8?arch=aarch64" } } }, { "category": "product_version", "name": "perf-0:4.18.0-193.el8.aarch64", "product": { "name": "perf-0:4.18.0-193.el8.aarch64", "product_id": "perf-0:4.18.0-193.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf@4.18.0-193.el8?arch=aarch64" } } }, { "category": "product_version", "name": "python3-perf-0:4.18.0-193.el8.aarch64", "product": { "name": "python3-perf-0:4.18.0-193.el8.aarch64", "product_id": "python3-perf-0:4.18.0-193.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-perf@4.18.0-193.el8?arch=aarch64" } } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "product": { "name": "kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "product_id": "kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-libs-devel@4.18.0-193.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "product": { "name": "bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "product_id": "bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-193.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "product": { "name": "kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "product_id": "kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-193.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "product": { "name": "kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "product_id": "kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-193.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "product": { "name": "kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "product_id": "kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common-ppc64le@4.18.0-193.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "product": { "name": "kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "product_id": "kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-193.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "perf-debuginfo-0:4.18.0-193.el8.ppc64le", "product": { "name": "perf-debuginfo-0:4.18.0-193.el8.ppc64le", "product_id": "perf-debuginfo-0:4.18.0-193.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-193.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "product": { "name": "python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "product_id": "python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-193.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "bpftool-0:4.18.0-193.el8.ppc64le", "product": { "name": "bpftool-0:4.18.0-193.el8.ppc64le", "product_id": "bpftool-0:4.18.0-193.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/bpftool@4.18.0-193.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-0:4.18.0-193.el8.ppc64le", "product": { "name": "kernel-0:4.18.0-193.el8.ppc64le", "product_id": "kernel-0:4.18.0-193.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@4.18.0-193.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-core-0:4.18.0-193.el8.ppc64le", "product": { "name": "kernel-core-0:4.18.0-193.el8.ppc64le", "product_id": "kernel-core-0:4.18.0-193.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-core@4.18.0-193.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "product": { "name": "kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "product_id": "kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-193.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debug-0:4.18.0-193.el8.ppc64le", "product": { "name": "kernel-debug-0:4.18.0-193.el8.ppc64le", "product_id": "kernel-debug-0:4.18.0-193.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@4.18.0-193.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debug-core-0:4.18.0-193.el8.ppc64le", "product": { "name": "kernel-debug-core-0:4.18.0-193.el8.ppc64le", "product_id": "kernel-debug-core-0:4.18.0-193.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-193.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "product": { "name": "kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "product_id": "kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-193.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "product": { "name": "kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "product_id": "kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-193.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "product": { "name": "kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "product_id": "kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-193.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-devel-0:4.18.0-193.el8.ppc64le", "product": { "name": "kernel-devel-0:4.18.0-193.el8.ppc64le", "product_id": "kernel-devel-0:4.18.0-193.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@4.18.0-193.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-headers-0:4.18.0-193.el8.ppc64le", "product": { "name": "kernel-headers-0:4.18.0-193.el8.ppc64le", "product_id": "kernel-headers-0:4.18.0-193.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@4.18.0-193.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-modules-0:4.18.0-193.el8.ppc64le", "product": { "name": "kernel-modules-0:4.18.0-193.el8.ppc64le", "product_id": "kernel-modules-0:4.18.0-193.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-modules@4.18.0-193.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "product": { "name": "kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "product_id": "kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-193.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-tools-0:4.18.0-193.el8.ppc64le", "product": { "name": "kernel-tools-0:4.18.0-193.el8.ppc64le", "product_id": "kernel-tools-0:4.18.0-193.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools@4.18.0-193.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "product": { "name": "kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "product_id": "kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-libs@4.18.0-193.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "perf-0:4.18.0-193.el8.ppc64le", "product": { "name": "perf-0:4.18.0-193.el8.ppc64le", "product_id": "perf-0:4.18.0-193.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf@4.18.0-193.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "python3-perf-0:4.18.0-193.el8.ppc64le", "product": { "name": "python3-perf-0:4.18.0-193.el8.ppc64le", "product_id": "python3-perf-0:4.18.0-193.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-perf@4.18.0-193.el8?arch=ppc64le" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "product": { "name": "kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "product_id": "kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-libs-devel@4.18.0-193.el8?arch=x86_64" } } }, { "category": "product_version", "name": "bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "product": { "name": "bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "product_id": "bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-193.el8?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "product": { "name": "kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "product_id": "kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-193.el8?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:4.18.0-193.el8.x86_64", "product": { "name": "kernel-debuginfo-0:4.18.0-193.el8.x86_64", "product_id": "kernel-debuginfo-0:4.18.0-193.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-193.el8?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "product": { "name": "kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "product_id": "kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common-x86_64@4.18.0-193.el8?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "product": { "name": "kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "product_id": "kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-193.el8?arch=x86_64" } } }, { "category": "product_version", "name": "perf-debuginfo-0:4.18.0-193.el8.x86_64", "product": { "name": "perf-debuginfo-0:4.18.0-193.el8.x86_64", "product_id": "perf-debuginfo-0:4.18.0-193.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-193.el8?arch=x86_64" } } }, { "category": "product_version", "name": "python3-perf-debuginfo-0:4.18.0-193.el8.x86_64", "product": { "name": "python3-perf-debuginfo-0:4.18.0-193.el8.x86_64", "product_id": "python3-perf-debuginfo-0:4.18.0-193.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-193.el8?arch=x86_64" } } }, { "category": "product_version", "name": "bpftool-0:4.18.0-193.el8.x86_64", "product": { "name": "bpftool-0:4.18.0-193.el8.x86_64", "product_id": "bpftool-0:4.18.0-193.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bpftool@4.18.0-193.el8?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-0:4.18.0-193.el8.x86_64", "product": { "name": "kernel-0:4.18.0-193.el8.x86_64", "product_id": "kernel-0:4.18.0-193.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@4.18.0-193.el8?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-core-0:4.18.0-193.el8.x86_64", "product": { "name": "kernel-core-0:4.18.0-193.el8.x86_64", "product_id": "kernel-core-0:4.18.0-193.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-core@4.18.0-193.el8?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-cross-headers-0:4.18.0-193.el8.x86_64", "product": { "name": "kernel-cross-headers-0:4.18.0-193.el8.x86_64", "product_id": "kernel-cross-headers-0:4.18.0-193.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-193.el8?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-0:4.18.0-193.el8.x86_64", "product": { "name": "kernel-debug-0:4.18.0-193.el8.x86_64", "product_id": "kernel-debug-0:4.18.0-193.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@4.18.0-193.el8?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-core-0:4.18.0-193.el8.x86_64", "product": { "name": "kernel-debug-core-0:4.18.0-193.el8.x86_64", "product_id": "kernel-debug-core-0:4.18.0-193.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-193.el8?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:4.18.0-193.el8.x86_64", "product": { "name": "kernel-debug-devel-0:4.18.0-193.el8.x86_64", "product_id": "kernel-debug-devel-0:4.18.0-193.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-193.el8?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-modules-0:4.18.0-193.el8.x86_64", "product": { "name": "kernel-debug-modules-0:4.18.0-193.el8.x86_64", "product_id": "kernel-debug-modules-0:4.18.0-193.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-193.el8?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "product": { "name": "kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "product_id": "kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-193.el8?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-devel-0:4.18.0-193.el8.x86_64", "product": { "name": "kernel-devel-0:4.18.0-193.el8.x86_64", "product_id": "kernel-devel-0:4.18.0-193.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@4.18.0-193.el8?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-headers-0:4.18.0-193.el8.x86_64", "product": { "name": "kernel-headers-0:4.18.0-193.el8.x86_64", "product_id": "kernel-headers-0:4.18.0-193.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@4.18.0-193.el8?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-modules-0:4.18.0-193.el8.x86_64", "product": { "name": "kernel-modules-0:4.18.0-193.el8.x86_64", "product_id": "kernel-modules-0:4.18.0-193.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-modules@4.18.0-193.el8?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-modules-extra-0:4.18.0-193.el8.x86_64", "product": { "name": "kernel-modules-extra-0:4.18.0-193.el8.x86_64", "product_id": "kernel-modules-extra-0:4.18.0-193.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-193.el8?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-tools-0:4.18.0-193.el8.x86_64", "product": { "name": "kernel-tools-0:4.18.0-193.el8.x86_64", "product_id": "kernel-tools-0:4.18.0-193.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools@4.18.0-193.el8?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-tools-libs-0:4.18.0-193.el8.x86_64", "product": { "name": "kernel-tools-libs-0:4.18.0-193.el8.x86_64", "product_id": "kernel-tools-libs-0:4.18.0-193.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-libs@4.18.0-193.el8?arch=x86_64" } } }, { "category": "product_version", "name": "perf-0:4.18.0-193.el8.x86_64", "product": { "name": "perf-0:4.18.0-193.el8.x86_64", "product_id": "perf-0:4.18.0-193.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf@4.18.0-193.el8?arch=x86_64" } } }, { "category": "product_version", "name": "python3-perf-0:4.18.0-193.el8.x86_64", "product": { "name": "python3-perf-0:4.18.0-193.el8.x86_64", "product_id": "python3-perf-0:4.18.0-193.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-perf@4.18.0-193.el8?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "bpftool-0:4.18.0-193.el8.s390x", "product": { "name": "bpftool-0:4.18.0-193.el8.s390x", "product_id": "bpftool-0:4.18.0-193.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/bpftool@4.18.0-193.el8?arch=s390x" } } }, { "category": "product_version", "name": "kernel-0:4.18.0-193.el8.s390x", "product": { "name": "kernel-0:4.18.0-193.el8.s390x", "product_id": "kernel-0:4.18.0-193.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@4.18.0-193.el8?arch=s390x" } } }, { "category": "product_version", "name": "kernel-core-0:4.18.0-193.el8.s390x", "product": { "name": "kernel-core-0:4.18.0-193.el8.s390x", "product_id": "kernel-core-0:4.18.0-193.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-core@4.18.0-193.el8?arch=s390x" } } }, { "category": "product_version", "name": "kernel-cross-headers-0:4.18.0-193.el8.s390x", "product": { "name": "kernel-cross-headers-0:4.18.0-193.el8.s390x", "product_id": "kernel-cross-headers-0:4.18.0-193.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-193.el8?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debug-0:4.18.0-193.el8.s390x", "product": { "name": "kernel-debug-0:4.18.0-193.el8.s390x", "product_id": "kernel-debug-0:4.18.0-193.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@4.18.0-193.el8?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debug-core-0:4.18.0-193.el8.s390x", "product": { "name": "kernel-debug-core-0:4.18.0-193.el8.s390x", "product_id": "kernel-debug-core-0:4.18.0-193.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-193.el8?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:4.18.0-193.el8.s390x", "product": { "name": "kernel-debug-devel-0:4.18.0-193.el8.s390x", "product_id": "kernel-debug-devel-0:4.18.0-193.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-193.el8?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debug-modules-0:4.18.0-193.el8.s390x", "product": { "name": "kernel-debug-modules-0:4.18.0-193.el8.s390x", "product_id": "kernel-debug-modules-0:4.18.0-193.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-193.el8?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "product": { "name": "kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "product_id": "kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-193.el8?arch=s390x" } } }, { "category": "product_version", "name": "kernel-devel-0:4.18.0-193.el8.s390x", "product": { "name": "kernel-devel-0:4.18.0-193.el8.s390x", "product_id": "kernel-devel-0:4.18.0-193.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@4.18.0-193.el8?arch=s390x" } } }, { "category": "product_version", "name": "kernel-headers-0:4.18.0-193.el8.s390x", "product": { "name": "kernel-headers-0:4.18.0-193.el8.s390x", "product_id": "kernel-headers-0:4.18.0-193.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@4.18.0-193.el8?arch=s390x" } } }, { "category": "product_version", "name": "kernel-modules-0:4.18.0-193.el8.s390x", "product": { "name": "kernel-modules-0:4.18.0-193.el8.s390x", "product_id": "kernel-modules-0:4.18.0-193.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-modules@4.18.0-193.el8?arch=s390x" } } }, { "category": "product_version", "name": "kernel-modules-extra-0:4.18.0-193.el8.s390x", "product": { "name": "kernel-modules-extra-0:4.18.0-193.el8.s390x", "product_id": "kernel-modules-extra-0:4.18.0-193.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-193.el8?arch=s390x" } } }, { "category": "product_version", "name": "kernel-tools-0:4.18.0-193.el8.s390x", "product": { "name": "kernel-tools-0:4.18.0-193.el8.s390x", "product_id": "kernel-tools-0:4.18.0-193.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools@4.18.0-193.el8?arch=s390x" } } }, { "category": "product_version", "name": "kernel-zfcpdump-0:4.18.0-193.el8.s390x", "product": { "name": "kernel-zfcpdump-0:4.18.0-193.el8.s390x", "product_id": "kernel-zfcpdump-0:4.18.0-193.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-zfcpdump@4.18.0-193.el8?arch=s390x" } } }, { "category": "product_version", "name": "kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "product": { "name": "kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "product_id": "kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-zfcpdump-core@4.18.0-193.el8?arch=s390x" } } }, { "category": "product_version", "name": "kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "product": { "name": "kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "product_id": "kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-zfcpdump-devel@4.18.0-193.el8?arch=s390x" } } }, { "category": "product_version", "name": "kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "product": { "name": "kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "product_id": "kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-zfcpdump-modules@4.18.0-193.el8?arch=s390x" } } }, { "category": "product_version", "name": "kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "product": { "name": "kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "product_id": "kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-zfcpdump-modules-extra@4.18.0-193.el8?arch=s390x" } } }, { "category": "product_version", "name": "perf-0:4.18.0-193.el8.s390x", "product": { "name": "perf-0:4.18.0-193.el8.s390x", "product_id": "perf-0:4.18.0-193.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf@4.18.0-193.el8?arch=s390x" } } }, { "category": "product_version", "name": "python3-perf-0:4.18.0-193.el8.s390x", "product": { "name": "python3-perf-0:4.18.0-193.el8.s390x", "product_id": "python3-perf-0:4.18.0-193.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-perf@4.18.0-193.el8?arch=s390x" } } }, { "category": "product_version", "name": "bpftool-debuginfo-0:4.18.0-193.el8.s390x", "product": { "name": "bpftool-debuginfo-0:4.18.0-193.el8.s390x", "product_id": "bpftool-debuginfo-0:4.18.0-193.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-193.el8?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "product": { "name": "kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "product_id": "kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-193.el8?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:4.18.0-193.el8.s390x", "product": { "name": "kernel-debuginfo-0:4.18.0-193.el8.s390x", "product_id": "kernel-debuginfo-0:4.18.0-193.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-193.el8?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "product": { "name": "kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "product_id": "kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common-s390x@4.18.0-193.el8?arch=s390x" } } }, { "category": "product_version", "name": "kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "product": { "name": "kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "product_id": "kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-193.el8?arch=s390x" } } }, { "category": "product_version", "name": "kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "product": { "name": "kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "product_id": "kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-zfcpdump-debuginfo@4.18.0-193.el8?arch=s390x" } } }, { "category": "product_version", "name": "perf-debuginfo-0:4.18.0-193.el8.s390x", "product": { "name": "perf-debuginfo-0:4.18.0-193.el8.s390x", "product_id": "perf-debuginfo-0:4.18.0-193.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-193.el8?arch=s390x" } } }, { "category": "product_version", "name": "python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "product": { "name": "python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "product_id": "python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-193.el8?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "kernel-0:4.18.0-193.el8.src", "product": { "name": "kernel-0:4.18.0-193.el8.src", "product_id": "kernel-0:4.18.0-193.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@4.18.0-193.el8?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "product": { "name": "kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "product_id": "kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-abi-whitelists@4.18.0-193.el8?arch=noarch" } } }, { "category": "product_version", "name": "kernel-doc-0:4.18.0-193.el8.noarch", "product": { "name": "kernel-doc-0:4.18.0-193.el8.noarch", "product_id": "kernel-doc-0:4.18.0-193.el8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-doc@4.18.0-193.el8?arch=noarch" } } } ], "category": "architecture", "name": "noarch" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "bpftool-0:4.18.0-193.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64" }, "product_reference": "bpftool-0:4.18.0-193.el8.aarch64", "relates_to_product_reference": "BaseOS-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-0:4.18.0-193.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le" }, "product_reference": "bpftool-0:4.18.0-193.el8.ppc64le", "relates_to_product_reference": "BaseOS-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-0:4.18.0-193.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x" }, "product_reference": "bpftool-0:4.18.0-193.el8.s390x", "relates_to_product_reference": "BaseOS-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-0:4.18.0-193.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64" }, "product_reference": "bpftool-0:4.18.0-193.el8.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-debuginfo-0:4.18.0-193.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64" }, "product_reference": "bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "relates_to_product_reference": "BaseOS-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-debuginfo-0:4.18.0-193.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le" }, "product_reference": "bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "relates_to_product_reference": "BaseOS-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-debuginfo-0:4.18.0-193.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x" }, "product_reference": "bpftool-debuginfo-0:4.18.0-193.el8.s390x", "relates_to_product_reference": "BaseOS-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-debuginfo-0:4.18.0-193.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64" }, "product_reference": "bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:4.18.0-193.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64" }, "product_reference": "kernel-0:4.18.0-193.el8.aarch64", "relates_to_product_reference": "BaseOS-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:4.18.0-193.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le" }, "product_reference": "kernel-0:4.18.0-193.el8.ppc64le", "relates_to_product_reference": "BaseOS-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:4.18.0-193.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x" }, "product_reference": "kernel-0:4.18.0-193.el8.s390x", "relates_to_product_reference": "BaseOS-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:4.18.0-193.el8.src as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.src" }, "product_reference": "kernel-0:4.18.0-193.el8.src", "relates_to_product_reference": "BaseOS-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:4.18.0-193.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64" }, "product_reference": "kernel-0:4.18.0-193.el8.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:4.18.0-193.el8.noarch as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch" }, "product_reference": "kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "relates_to_product_reference": "BaseOS-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-core-0:4.18.0-193.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64" }, "product_reference": "kernel-core-0:4.18.0-193.el8.aarch64", "relates_to_product_reference": "BaseOS-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-core-0:4.18.0-193.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le" }, "product_reference": "kernel-core-0:4.18.0-193.el8.ppc64le", "relates_to_product_reference": "BaseOS-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-core-0:4.18.0-193.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x" }, "product_reference": "kernel-core-0:4.18.0-193.el8.s390x", "relates_to_product_reference": "BaseOS-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-core-0:4.18.0-193.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64" }, "product_reference": "kernel-core-0:4.18.0-193.el8.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-cross-headers-0:4.18.0-193.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64" }, "product_reference": "kernel-cross-headers-0:4.18.0-193.el8.aarch64", "relates_to_product_reference": "BaseOS-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-cross-headers-0:4.18.0-193.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le" }, "product_reference": "kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "relates_to_product_reference": "BaseOS-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-cross-headers-0:4.18.0-193.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x" }, "product_reference": "kernel-cross-headers-0:4.18.0-193.el8.s390x", "relates_to_product_reference": "BaseOS-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-cross-headers-0:4.18.0-193.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64" }, "product_reference": "kernel-cross-headers-0:4.18.0-193.el8.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:4.18.0-193.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64" }, "product_reference": "kernel-debug-0:4.18.0-193.el8.aarch64", "relates_to_product_reference": "BaseOS-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:4.18.0-193.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le" }, "product_reference": "kernel-debug-0:4.18.0-193.el8.ppc64le", "relates_to_product_reference": "BaseOS-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:4.18.0-193.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x" }, "product_reference": "kernel-debug-0:4.18.0-193.el8.s390x", "relates_to_product_reference": "BaseOS-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:4.18.0-193.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64" }, "product_reference": "kernel-debug-0:4.18.0-193.el8.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-core-0:4.18.0-193.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64" }, "product_reference": "kernel-debug-core-0:4.18.0-193.el8.aarch64", "relates_to_product_reference": "BaseOS-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-core-0:4.18.0-193.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le" }, "product_reference": "kernel-debug-core-0:4.18.0-193.el8.ppc64le", "relates_to_product_reference": "BaseOS-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-core-0:4.18.0-193.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x" }, "product_reference": "kernel-debug-core-0:4.18.0-193.el8.s390x", "relates_to_product_reference": "BaseOS-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-core-0:4.18.0-193.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64" }, "product_reference": "kernel-debug-core-0:4.18.0-193.el8.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64" }, "product_reference": "kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "relates_to_product_reference": "BaseOS-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le" }, "product_reference": "kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "relates_to_product_reference": "BaseOS-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:4.18.0-193.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x" }, "product_reference": "kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "relates_to_product_reference": "BaseOS-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:4.18.0-193.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64" }, "product_reference": "kernel-debug-devel-0:4.18.0-193.el8.aarch64", "relates_to_product_reference": "BaseOS-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:4.18.0-193.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le" }, "product_reference": "kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "relates_to_product_reference": "BaseOS-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:4.18.0-193.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x" }, "product_reference": "kernel-debug-devel-0:4.18.0-193.el8.s390x", "relates_to_product_reference": "BaseOS-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:4.18.0-193.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64" }, "product_reference": "kernel-debug-devel-0:4.18.0-193.el8.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-0:4.18.0-193.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64" }, "product_reference": "kernel-debug-modules-0:4.18.0-193.el8.aarch64", "relates_to_product_reference": "BaseOS-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-0:4.18.0-193.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le" }, "product_reference": "kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "relates_to_product_reference": "BaseOS-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-0:4.18.0-193.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x" }, "product_reference": "kernel-debug-modules-0:4.18.0-193.el8.s390x", "relates_to_product_reference": "BaseOS-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-0:4.18.0-193.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64" }, "product_reference": "kernel-debug-modules-0:4.18.0-193.el8.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64" }, "product_reference": "kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "relates_to_product_reference": "BaseOS-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le" }, "product_reference": "kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "relates_to_product_reference": "BaseOS-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-extra-0:4.18.0-193.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x" }, "product_reference": "kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "relates_to_product_reference": "BaseOS-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64" }, "product_reference": "kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:4.18.0-193.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64" }, "product_reference": "kernel-debuginfo-0:4.18.0-193.el8.aarch64", "relates_to_product_reference": "BaseOS-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:4.18.0-193.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le" }, "product_reference": "kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "relates_to_product_reference": "BaseOS-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:4.18.0-193.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x" }, "product_reference": "kernel-debuginfo-0:4.18.0-193.el8.s390x", "relates_to_product_reference": "BaseOS-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:4.18.0-193.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64" }, "product_reference": "kernel-debuginfo-0:4.18.0-193.el8.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64" }, "product_reference": "kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "relates_to_product_reference": "BaseOS-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le" }, "product_reference": "kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "relates_to_product_reference": "BaseOS-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x" }, "product_reference": "kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "relates_to_product_reference": "BaseOS-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:4.18.0-193.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64" }, "product_reference": "kernel-devel-0:4.18.0-193.el8.aarch64", "relates_to_product_reference": "BaseOS-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:4.18.0-193.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le" }, "product_reference": "kernel-devel-0:4.18.0-193.el8.ppc64le", "relates_to_product_reference": "BaseOS-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:4.18.0-193.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x" }, "product_reference": "kernel-devel-0:4.18.0-193.el8.s390x", "relates_to_product_reference": "BaseOS-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:4.18.0-193.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64" }, "product_reference": "kernel-devel-0:4.18.0-193.el8.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:4.18.0-193.el8.noarch as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch" }, "product_reference": "kernel-doc-0:4.18.0-193.el8.noarch", "relates_to_product_reference": "BaseOS-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:4.18.0-193.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64" }, "product_reference": "kernel-headers-0:4.18.0-193.el8.aarch64", "relates_to_product_reference": "BaseOS-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:4.18.0-193.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le" }, "product_reference": "kernel-headers-0:4.18.0-193.el8.ppc64le", "relates_to_product_reference": "BaseOS-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:4.18.0-193.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x" }, "product_reference": "kernel-headers-0:4.18.0-193.el8.s390x", "relates_to_product_reference": "BaseOS-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:4.18.0-193.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64" }, "product_reference": "kernel-headers-0:4.18.0-193.el8.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-0:4.18.0-193.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64" }, "product_reference": "kernel-modules-0:4.18.0-193.el8.aarch64", "relates_to_product_reference": "BaseOS-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-0:4.18.0-193.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le" }, "product_reference": "kernel-modules-0:4.18.0-193.el8.ppc64le", "relates_to_product_reference": "BaseOS-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-0:4.18.0-193.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x" }, "product_reference": "kernel-modules-0:4.18.0-193.el8.s390x", "relates_to_product_reference": "BaseOS-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-0:4.18.0-193.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64" }, "product_reference": "kernel-modules-0:4.18.0-193.el8.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-extra-0:4.18.0-193.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64" }, "product_reference": "kernel-modules-extra-0:4.18.0-193.el8.aarch64", "relates_to_product_reference": "BaseOS-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-extra-0:4.18.0-193.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le" }, "product_reference": "kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "relates_to_product_reference": "BaseOS-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-extra-0:4.18.0-193.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x" }, "product_reference": "kernel-modules-extra-0:4.18.0-193.el8.s390x", "relates_to_product_reference": "BaseOS-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-extra-0:4.18.0-193.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64" }, "product_reference": "kernel-modules-extra-0:4.18.0-193.el8.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:4.18.0-193.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64" }, "product_reference": "kernel-tools-0:4.18.0-193.el8.aarch64", "relates_to_product_reference": "BaseOS-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:4.18.0-193.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le" }, "product_reference": "kernel-tools-0:4.18.0-193.el8.ppc64le", "relates_to_product_reference": "BaseOS-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:4.18.0-193.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x" }, "product_reference": "kernel-tools-0:4.18.0-193.el8.s390x", "relates_to_product_reference": "BaseOS-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:4.18.0-193.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64" }, "product_reference": "kernel-tools-0:4.18.0-193.el8.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64" }, "product_reference": "kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "relates_to_product_reference": "BaseOS-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le" }, "product_reference": "kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "relates_to_product_reference": "BaseOS-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:4.18.0-193.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x" }, "product_reference": "kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "relates_to_product_reference": "BaseOS-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64" }, "product_reference": "kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:4.18.0-193.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64" }, "product_reference": "kernel-tools-libs-0:4.18.0-193.el8.aarch64", "relates_to_product_reference": "BaseOS-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:4.18.0-193.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le" }, "product_reference": "kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "relates_to_product_reference": "BaseOS-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:4.18.0-193.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64" }, "product_reference": "kernel-tools-libs-0:4.18.0-193.el8.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64" }, "product_reference": "kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "relates_to_product_reference": "BaseOS-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le" }, "product_reference": "kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "relates_to_product_reference": "BaseOS-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64" }, "product_reference": "kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-zfcpdump-0:4.18.0-193.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x" }, "product_reference": "kernel-zfcpdump-0:4.18.0-193.el8.s390x", "relates_to_product_reference": "BaseOS-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-zfcpdump-core-0:4.18.0-193.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x" }, "product_reference": "kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "relates_to_product_reference": "BaseOS-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x" }, "product_reference": "kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "relates_to_product_reference": "BaseOS-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x" }, "product_reference": "kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "relates_to_product_reference": "BaseOS-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x" }, "product_reference": "kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "relates_to_product_reference": "BaseOS-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x" }, "product_reference": "kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "relates_to_product_reference": "BaseOS-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:4.18.0-193.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64" }, "product_reference": "perf-0:4.18.0-193.el8.aarch64", "relates_to_product_reference": "BaseOS-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:4.18.0-193.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le" }, "product_reference": "perf-0:4.18.0-193.el8.ppc64le", "relates_to_product_reference": "BaseOS-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:4.18.0-193.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.s390x" }, "product_reference": "perf-0:4.18.0-193.el8.s390x", "relates_to_product_reference": "BaseOS-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:4.18.0-193.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64" }, "product_reference": "perf-0:4.18.0-193.el8.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:4.18.0-193.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64" }, "product_reference": "perf-debuginfo-0:4.18.0-193.el8.aarch64", "relates_to_product_reference": "BaseOS-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:4.18.0-193.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le" }, "product_reference": "perf-debuginfo-0:4.18.0-193.el8.ppc64le", "relates_to_product_reference": "BaseOS-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:4.18.0-193.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x" }, "product_reference": "perf-debuginfo-0:4.18.0-193.el8.s390x", "relates_to_product_reference": "BaseOS-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:4.18.0-193.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64" }, "product_reference": "perf-debuginfo-0:4.18.0-193.el8.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-0:4.18.0-193.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64" }, "product_reference": "python3-perf-0:4.18.0-193.el8.aarch64", "relates_to_product_reference": "BaseOS-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-0:4.18.0-193.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le" }, "product_reference": "python3-perf-0:4.18.0-193.el8.ppc64le", "relates_to_product_reference": "BaseOS-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-0:4.18.0-193.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x" }, "product_reference": "python3-perf-0:4.18.0-193.el8.s390x", "relates_to_product_reference": "BaseOS-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-0:4.18.0-193.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64" }, "product_reference": "python3-perf-0:4.18.0-193.el8.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-debuginfo-0:4.18.0-193.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64" }, "product_reference": "python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "relates_to_product_reference": "BaseOS-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le" }, "product_reference": "python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "relates_to_product_reference": "BaseOS-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-debuginfo-0:4.18.0-193.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x" }, "product_reference": "python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "relates_to_product_reference": "BaseOS-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-debuginfo-0:4.18.0-193.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64" }, "product_reference": "python3-perf-debuginfo-0:4.18.0-193.el8.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-0:4.18.0-193.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64" }, "product_reference": "bpftool-0:4.18.0-193.el8.aarch64", "relates_to_product_reference": "CRB-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-0:4.18.0-193.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le" }, "product_reference": "bpftool-0:4.18.0-193.el8.ppc64le", "relates_to_product_reference": "CRB-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-0:4.18.0-193.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x" }, "product_reference": "bpftool-0:4.18.0-193.el8.s390x", "relates_to_product_reference": "CRB-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-0:4.18.0-193.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64" }, "product_reference": "bpftool-0:4.18.0-193.el8.x86_64", "relates_to_product_reference": "CRB-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-debuginfo-0:4.18.0-193.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64" }, "product_reference": "bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "relates_to_product_reference": "CRB-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-debuginfo-0:4.18.0-193.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le" }, "product_reference": "bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "relates_to_product_reference": "CRB-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-debuginfo-0:4.18.0-193.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x" }, "product_reference": "bpftool-debuginfo-0:4.18.0-193.el8.s390x", "relates_to_product_reference": "CRB-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-debuginfo-0:4.18.0-193.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64" }, "product_reference": "bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "relates_to_product_reference": "CRB-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:4.18.0-193.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64" }, "product_reference": "kernel-0:4.18.0-193.el8.aarch64", "relates_to_product_reference": "CRB-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:4.18.0-193.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le" }, "product_reference": "kernel-0:4.18.0-193.el8.ppc64le", "relates_to_product_reference": "CRB-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:4.18.0-193.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x" }, "product_reference": "kernel-0:4.18.0-193.el8.s390x", "relates_to_product_reference": "CRB-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:4.18.0-193.el8.src as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.src" }, "product_reference": "kernel-0:4.18.0-193.el8.src", "relates_to_product_reference": "CRB-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:4.18.0-193.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64" }, "product_reference": "kernel-0:4.18.0-193.el8.x86_64", "relates_to_product_reference": "CRB-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:4.18.0-193.el8.noarch as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch" }, "product_reference": "kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "relates_to_product_reference": "CRB-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-core-0:4.18.0-193.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64" }, "product_reference": "kernel-core-0:4.18.0-193.el8.aarch64", "relates_to_product_reference": "CRB-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-core-0:4.18.0-193.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le" }, "product_reference": "kernel-core-0:4.18.0-193.el8.ppc64le", "relates_to_product_reference": "CRB-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-core-0:4.18.0-193.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x" }, "product_reference": "kernel-core-0:4.18.0-193.el8.s390x", "relates_to_product_reference": "CRB-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-core-0:4.18.0-193.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64" }, "product_reference": "kernel-core-0:4.18.0-193.el8.x86_64", "relates_to_product_reference": "CRB-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-cross-headers-0:4.18.0-193.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64" }, "product_reference": "kernel-cross-headers-0:4.18.0-193.el8.aarch64", "relates_to_product_reference": "CRB-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-cross-headers-0:4.18.0-193.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le" }, "product_reference": "kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "relates_to_product_reference": "CRB-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-cross-headers-0:4.18.0-193.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x" }, "product_reference": "kernel-cross-headers-0:4.18.0-193.el8.s390x", "relates_to_product_reference": "CRB-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-cross-headers-0:4.18.0-193.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64" }, "product_reference": "kernel-cross-headers-0:4.18.0-193.el8.x86_64", "relates_to_product_reference": "CRB-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:4.18.0-193.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64" }, "product_reference": "kernel-debug-0:4.18.0-193.el8.aarch64", "relates_to_product_reference": "CRB-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:4.18.0-193.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le" }, "product_reference": "kernel-debug-0:4.18.0-193.el8.ppc64le", "relates_to_product_reference": "CRB-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:4.18.0-193.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x" }, "product_reference": "kernel-debug-0:4.18.0-193.el8.s390x", "relates_to_product_reference": "CRB-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:4.18.0-193.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64" }, "product_reference": "kernel-debug-0:4.18.0-193.el8.x86_64", "relates_to_product_reference": "CRB-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-core-0:4.18.0-193.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64" }, "product_reference": "kernel-debug-core-0:4.18.0-193.el8.aarch64", "relates_to_product_reference": "CRB-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-core-0:4.18.0-193.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le" }, "product_reference": "kernel-debug-core-0:4.18.0-193.el8.ppc64le", "relates_to_product_reference": "CRB-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-core-0:4.18.0-193.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x" }, "product_reference": "kernel-debug-core-0:4.18.0-193.el8.s390x", "relates_to_product_reference": "CRB-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-core-0:4.18.0-193.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64" }, "product_reference": "kernel-debug-core-0:4.18.0-193.el8.x86_64", "relates_to_product_reference": "CRB-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64" }, "product_reference": "kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "relates_to_product_reference": "CRB-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le" }, "product_reference": "kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "relates_to_product_reference": "CRB-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:4.18.0-193.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x" }, "product_reference": "kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "relates_to_product_reference": "CRB-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "relates_to_product_reference": "CRB-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:4.18.0-193.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64" }, "product_reference": "kernel-debug-devel-0:4.18.0-193.el8.aarch64", "relates_to_product_reference": "CRB-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:4.18.0-193.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le" }, "product_reference": "kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "relates_to_product_reference": "CRB-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:4.18.0-193.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x" }, "product_reference": "kernel-debug-devel-0:4.18.0-193.el8.s390x", "relates_to_product_reference": "CRB-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:4.18.0-193.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64" }, "product_reference": "kernel-debug-devel-0:4.18.0-193.el8.x86_64", "relates_to_product_reference": "CRB-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-0:4.18.0-193.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64" }, "product_reference": "kernel-debug-modules-0:4.18.0-193.el8.aarch64", "relates_to_product_reference": "CRB-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-0:4.18.0-193.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le" }, "product_reference": "kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "relates_to_product_reference": "CRB-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-0:4.18.0-193.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x" }, "product_reference": "kernel-debug-modules-0:4.18.0-193.el8.s390x", "relates_to_product_reference": "CRB-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-0:4.18.0-193.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64" }, "product_reference": "kernel-debug-modules-0:4.18.0-193.el8.x86_64", "relates_to_product_reference": "CRB-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64" }, "product_reference": "kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "relates_to_product_reference": "CRB-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le" }, "product_reference": "kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "relates_to_product_reference": "CRB-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-extra-0:4.18.0-193.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x" }, "product_reference": "kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "relates_to_product_reference": "CRB-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64" }, "product_reference": "kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "relates_to_product_reference": "CRB-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:4.18.0-193.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64" }, "product_reference": "kernel-debuginfo-0:4.18.0-193.el8.aarch64", "relates_to_product_reference": "CRB-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:4.18.0-193.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le" }, "product_reference": "kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "relates_to_product_reference": "CRB-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:4.18.0-193.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x" }, "product_reference": "kernel-debuginfo-0:4.18.0-193.el8.s390x", "relates_to_product_reference": "CRB-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:4.18.0-193.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64" }, "product_reference": "kernel-debuginfo-0:4.18.0-193.el8.x86_64", "relates_to_product_reference": "CRB-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64" }, "product_reference": "kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "relates_to_product_reference": "CRB-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le" }, "product_reference": "kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "relates_to_product_reference": "CRB-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x" }, "product_reference": "kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "relates_to_product_reference": "CRB-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "relates_to_product_reference": "CRB-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:4.18.0-193.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64" }, "product_reference": "kernel-devel-0:4.18.0-193.el8.aarch64", "relates_to_product_reference": "CRB-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:4.18.0-193.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le" }, "product_reference": "kernel-devel-0:4.18.0-193.el8.ppc64le", "relates_to_product_reference": "CRB-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:4.18.0-193.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x" }, "product_reference": "kernel-devel-0:4.18.0-193.el8.s390x", "relates_to_product_reference": "CRB-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:4.18.0-193.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64" }, "product_reference": "kernel-devel-0:4.18.0-193.el8.x86_64", "relates_to_product_reference": "CRB-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:4.18.0-193.el8.noarch as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch" }, "product_reference": "kernel-doc-0:4.18.0-193.el8.noarch", "relates_to_product_reference": "CRB-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:4.18.0-193.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64" }, "product_reference": "kernel-headers-0:4.18.0-193.el8.aarch64", "relates_to_product_reference": "CRB-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:4.18.0-193.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le" }, "product_reference": "kernel-headers-0:4.18.0-193.el8.ppc64le", "relates_to_product_reference": "CRB-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:4.18.0-193.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x" }, "product_reference": "kernel-headers-0:4.18.0-193.el8.s390x", "relates_to_product_reference": "CRB-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:4.18.0-193.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64" }, "product_reference": "kernel-headers-0:4.18.0-193.el8.x86_64", "relates_to_product_reference": "CRB-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-0:4.18.0-193.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64" }, "product_reference": "kernel-modules-0:4.18.0-193.el8.aarch64", "relates_to_product_reference": "CRB-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-0:4.18.0-193.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le" }, "product_reference": "kernel-modules-0:4.18.0-193.el8.ppc64le", "relates_to_product_reference": "CRB-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-0:4.18.0-193.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x" }, "product_reference": "kernel-modules-0:4.18.0-193.el8.s390x", "relates_to_product_reference": "CRB-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-0:4.18.0-193.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64" }, "product_reference": "kernel-modules-0:4.18.0-193.el8.x86_64", "relates_to_product_reference": "CRB-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-extra-0:4.18.0-193.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64" }, "product_reference": "kernel-modules-extra-0:4.18.0-193.el8.aarch64", "relates_to_product_reference": "CRB-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-extra-0:4.18.0-193.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le" }, "product_reference": "kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "relates_to_product_reference": "CRB-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-extra-0:4.18.0-193.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x" }, "product_reference": "kernel-modules-extra-0:4.18.0-193.el8.s390x", "relates_to_product_reference": "CRB-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-extra-0:4.18.0-193.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64" }, "product_reference": "kernel-modules-extra-0:4.18.0-193.el8.x86_64", "relates_to_product_reference": "CRB-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:4.18.0-193.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64" }, "product_reference": "kernel-tools-0:4.18.0-193.el8.aarch64", "relates_to_product_reference": "CRB-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:4.18.0-193.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le" }, "product_reference": "kernel-tools-0:4.18.0-193.el8.ppc64le", "relates_to_product_reference": "CRB-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:4.18.0-193.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x" }, "product_reference": "kernel-tools-0:4.18.0-193.el8.s390x", "relates_to_product_reference": "CRB-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:4.18.0-193.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64" }, "product_reference": "kernel-tools-0:4.18.0-193.el8.x86_64", "relates_to_product_reference": "CRB-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64" }, "product_reference": "kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "relates_to_product_reference": "CRB-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le" }, "product_reference": "kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "relates_to_product_reference": "CRB-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:4.18.0-193.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x" }, "product_reference": "kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "relates_to_product_reference": "CRB-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64" }, "product_reference": "kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "relates_to_product_reference": "CRB-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:4.18.0-193.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64" }, "product_reference": "kernel-tools-libs-0:4.18.0-193.el8.aarch64", "relates_to_product_reference": "CRB-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:4.18.0-193.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le" }, "product_reference": "kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "relates_to_product_reference": "CRB-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:4.18.0-193.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64" }, "product_reference": "kernel-tools-libs-0:4.18.0-193.el8.x86_64", "relates_to_product_reference": "CRB-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64" }, "product_reference": "kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "relates_to_product_reference": "CRB-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le" }, "product_reference": "kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "relates_to_product_reference": "CRB-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64" }, "product_reference": "kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "relates_to_product_reference": "CRB-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-zfcpdump-0:4.18.0-193.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x" }, "product_reference": "kernel-zfcpdump-0:4.18.0-193.el8.s390x", "relates_to_product_reference": "CRB-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-zfcpdump-core-0:4.18.0-193.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x" }, "product_reference": "kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "relates_to_product_reference": "CRB-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x" }, "product_reference": "kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "relates_to_product_reference": "CRB-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x" }, "product_reference": "kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "relates_to_product_reference": "CRB-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x" }, "product_reference": "kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "relates_to_product_reference": "CRB-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x" }, "product_reference": "kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "relates_to_product_reference": "CRB-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:4.18.0-193.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64" }, "product_reference": "perf-0:4.18.0-193.el8.aarch64", "relates_to_product_reference": "CRB-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:4.18.0-193.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le" }, "product_reference": "perf-0:4.18.0-193.el8.ppc64le", "relates_to_product_reference": "CRB-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:4.18.0-193.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.s390x" }, "product_reference": "perf-0:4.18.0-193.el8.s390x", "relates_to_product_reference": "CRB-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:4.18.0-193.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64" }, "product_reference": "perf-0:4.18.0-193.el8.x86_64", "relates_to_product_reference": "CRB-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:4.18.0-193.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64" }, "product_reference": "perf-debuginfo-0:4.18.0-193.el8.aarch64", "relates_to_product_reference": "CRB-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:4.18.0-193.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le" }, "product_reference": "perf-debuginfo-0:4.18.0-193.el8.ppc64le", "relates_to_product_reference": "CRB-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:4.18.0-193.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x" }, "product_reference": "perf-debuginfo-0:4.18.0-193.el8.s390x", "relates_to_product_reference": "CRB-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:4.18.0-193.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64" }, "product_reference": "perf-debuginfo-0:4.18.0-193.el8.x86_64", "relates_to_product_reference": "CRB-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-0:4.18.0-193.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64" }, "product_reference": "python3-perf-0:4.18.0-193.el8.aarch64", "relates_to_product_reference": "CRB-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-0:4.18.0-193.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le" }, "product_reference": "python3-perf-0:4.18.0-193.el8.ppc64le", "relates_to_product_reference": "CRB-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-0:4.18.0-193.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x" }, "product_reference": "python3-perf-0:4.18.0-193.el8.s390x", "relates_to_product_reference": "CRB-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-0:4.18.0-193.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64" }, "product_reference": "python3-perf-0:4.18.0-193.el8.x86_64", "relates_to_product_reference": "CRB-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-debuginfo-0:4.18.0-193.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64" }, "product_reference": "python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "relates_to_product_reference": "CRB-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le" }, "product_reference": "python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "relates_to_product_reference": "CRB-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-debuginfo-0:4.18.0-193.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x" }, "product_reference": "python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "relates_to_product_reference": "CRB-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-debuginfo-0:4.18.0-193.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64" }, "product_reference": "python3-perf-debuginfo-0:4.18.0-193.el8.x86_64", "relates_to_product_reference": "CRB-8.2.0.GA" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "Hangbin Liu" ], "organization": "Red Hat", "summary": "This issue was discovered by Red Hat." }, { "names": [ "Jasu Liedes" ], "organization": "Synopsys SIG" } ], "cve": "CVE-2018-16871", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "discovery_date": "2018-11-21T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1655162" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Linux kernel\u0027s NFS implementation. An attacker, who is able to mount an exported NFS filesystem, is able to trigger a null pointer dereference by using an invalid NFS sequence. This can panic the machine and deny access to the NFS server. Any outstanding disk writes to the NFS server will be lost.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: nfs: NULL pointer dereference due to an anomalized NFS message sequence", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-16871" }, { "category": "external", "summary": "RHBZ#1655162", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1655162" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-16871", "url": "https://www.cve.org/CVERecord?id=CVE-2018-16871" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-16871", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-16871" } ], "release_date": "2019-06-03T02:23:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-04-28T15:43:14+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2020:1769" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: nfs: NULL pointer dereference due to an anomalized NFS message sequence" }, { "cve": "CVE-2019-5108", "cwe": { "id": "CWE-440", "name": "Expected Behavior Violation" }, "discovery_date": "2020-01-10T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1789927" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Linux kernel\u2019s implementation of the WiFi station handoff code. An attacker within the radio range could use this flaw to deny a valid device from joining the access point.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: triggering AP to send IAPP location updates for stations before the required authentication process has completed can lead to DoS", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-5108" }, { "category": "external", "summary": "RHBZ#1789927", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1789927" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-5108", "url": "https://www.cve.org/CVERecord?id=CVE-2019-5108" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-5108", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-5108" } ], "release_date": "2019-12-11T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-04-28T15:43:14+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2020:1769" }, { "category": "workaround", "details": "At this time there is no known mitigations to this issue other than to install the updated kernel package.", "product_ids": [ "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: triggering AP to send IAPP location updates for stations before the required authentication process has completed can lead to DoS" }, { "cve": "CVE-2019-8980", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-02-21T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1679972" } ], "notes": [ { "category": "description", "text": "A kernel memory leak was found in the kernel_read_file() function in the fs/exec.c file in the Linux kernel. An attacker could use this flaw to cause a memory leak and thus a denial of service (DoS).", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: memory leak in the kernel_read_file function in fs/exec.c allows to cause a denial of service", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-8980" }, { "category": "external", "summary": "RHBZ#1679972", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1679972" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-8980", "url": "https://www.cve.org/CVERecord?id=CVE-2019-8980" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-8980", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-8980" } ], "release_date": "2019-02-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-04-28T15:43:14+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2020:1769" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: memory leak in the kernel_read_file function in fs/exec.c allows to cause a denial of service" }, { "cve": "CVE-2019-10639", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2019-07-06T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1729933" } ], "notes": [ { "category": "description", "text": "A flaw was found in the way the Linux kernel derived the IP ID field from a partial kernel space address returned by a net_hash_mix() function. A remote user could observe this IP ID field to extract the kernel\u00a0address bits used to derive its value, which may result in leaking the hash key and potentially defeating KASLR.", "title": "Vulnerability description" }, { "category": "summary", "text": "Kernel: net: using kernel space address bits to derive IP ID may potentially break KASLR", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue does not affect the versions of Linux kernel as shipped with Red Hat Enterprise Linux 5 and Red Hat Enterprise Linux 6.\n\nThis issue affects the version of Linux kernel as shipped with Red Hat Enterprise Linux 7, 8 and Red Hat Enterprise MRG 2. Future kernel updates for Red Hat Enterprise Linux 7, 8 and Red Hat Enterprise MRG 2 may address this issue.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-10639" }, { "category": "external", "summary": "RHBZ#1729933", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1729933" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-10639", "url": "https://www.cve.org/CVERecord?id=CVE-2019-10639" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-10639", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-10639" }, { "category": "external", "summary": "https://arxiv.org/pdf/1906.10478.pdf", "url": "https://arxiv.org/pdf/1906.10478.pdf" } ], "release_date": "2019-07-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-04-28T15:43:14+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2020:1769" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 3.7, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" }, "products": [ "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "Kernel: net: using kernel space address bits to derive IP ID may potentially break KASLR" }, { "cve": "CVE-2019-12819", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2019-06-14T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1721962" } ], "notes": [ { "category": "description", "text": "A use-after-free flaw was found in the Linux kernel\u0027s MDIO section of the network management subsystem. An attacker who is able to hot-plug a network device can trigger the __mdiobus_register() function in drivers/net/phy/mdio_bus.c, which can cause a use-after-free condition causing a memory corruption and kernel panic or privilege escalation.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: use-after-free in function __mdiobus_register() in drivers/net/phy/mdio_bus.c", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-12819" }, { "category": "external", "summary": "RHBZ#1721962", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1721962" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-12819", "url": "https://www.cve.org/CVERecord?id=CVE-2019-12819" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-12819", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-12819" } ], "release_date": "2019-06-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-04-28T15:43:14+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2020:1769" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 4.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N", "version": "3.0" }, "products": [ "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: use-after-free in function __mdiobus_register() in drivers/net/phy/mdio_bus.c" }, { "cve": "CVE-2019-15090", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "discovery_date": "2019-08-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1743526" } ], "notes": [ { "category": "description", "text": "An out-of-bounds (OOB) memory access flaw was found in the Qlogic ISCSI module in the Linux kernel\u0027s qedi_dbg_* family of functions in drivers/scsi/qedi/qedi_dbg.c. Here a local attacker with a special user privilege account (or a root) can cause an out-of-bound memory access leading to a system crash or a leak of internal kernel information.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: An out-of-bounds read in drivers/scsi/qedi/qedi_dbg.c leading to crash or information disclosure", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-15090" }, { "category": "external", "summary": "RHBZ#1743526", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1743526" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-15090", "url": "https://www.cve.org/CVERecord?id=CVE-2019-15090" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-15090", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-15090" } ], "release_date": "2019-08-20T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-04-28T15:43:14+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2020:1769" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "kernel: An out-of-bounds read in drivers/scsi/qedi/qedi_dbg.c leading to crash or information disclosure" }, { "cve": "CVE-2019-15099", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2019-08-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1743560" } ], "notes": [ { "category": "description", "text": "A null pointer dereference flaw was discovered in the Linux kernel\u0027s implementation of the ath10k USB device driver. The vulnerability requires the attacker to plug in a specially crafted hardware device that present endpoint descriptors that normal ath10k devices do not recognize. System availability is the highest threat with this vulnerability.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: a NULL pointer dereference in drivers/net/wireless/ath/ath10k/usb.c leads to a crash", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-15099" }, { "category": "external", "summary": "RHBZ#1743560", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1743560" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-15099", "url": "https://www.cve.org/CVERecord?id=CVE-2019-15099" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-15099", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-15099" } ], "release_date": "2019-08-20T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-04-28T15:43:14+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2020:1769" }, { "category": "workaround", "details": "As the ath10k module will be auto-loaded when required, its use can be disabled by preventing the module from loading using the following instructions.\n\nOn the command line, as root, execute the following command:\n# echo \"install ath10k_usb /bin/true\" \u003e\u003e /etc/modprobe.d/disable-ath10k_usb.conf \n \nThe system will need to be restarted if the ath10k_usb module are loaded. In most circumstances, the kernel modules will be unable to be unloaded while the ath10k WiFi network interface is in use. If the system requires this module to work correctly, this mitigation may not be suitable.\n\nIf you need further assistance, see KCS article https://access.redhat.com/solutions/41278 or contact Red Hat Global Support Services.", "product_ids": [ "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "PHYSICAL", "availabilityImpact": "HIGH", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "kernel: a NULL pointer dereference in drivers/net/wireless/ath/ath10k/usb.c leads to a crash" }, { "cve": "CVE-2019-15221", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "discovery_date": "2019-08-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1749974" } ], "notes": [ { "category": "description", "text": "A NULL pointer dereference flaw was found in the way the LINE6 drivers in the Linux kernel allocated buffers for USB packets. This flaw allows an attacker with physical access to the system to crash the system.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: Null pointer dereference in the sound/usb/line6/pcm.c", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue is rated as having Low impact because of the physical access needed to trigger this issue.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-15221" }, { "category": "external", "summary": "RHBZ#1749974", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1749974" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-15221", "url": "https://www.cve.org/CVERecord?id=CVE-2019-15221" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-15221", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-15221" } ], "release_date": "2019-08-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-04-28T15:43:14+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2020:1769" }, { "category": "workaround", "details": "To mitigate this issue, prevent module snd-usb-line6 from being loaded. Please see https://access.redhat.com/solutions/41278 for how to blacklist a kernel module to prevent it from loading automatically.", "product_ids": [ "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "PHYSICAL", "availabilityImpact": "HIGH", "baseScore": 4.6, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "kernel: Null pointer dereference in the sound/usb/line6/pcm.c" }, { "cve": "CVE-2019-15223", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "discovery_date": "2019-08-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1749976" } ], "notes": [ { "category": "description", "text": "A NULL pointer dereference flaw was found in the way the Line 6 POD USB driver in the Linux kernel handled disconnection. This flaw allows an attacker with physical access to the system to crash the system.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: Null pointer dereference in the sound/usb/line6/driver.c", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue is rated as having Low impact because of the physical access needed to trigger this issue.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-15223" }, { "category": "external", "summary": "RHBZ#1749976", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1749976" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-15223", "url": "https://www.cve.org/CVERecord?id=CVE-2019-15223" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-15223", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-15223" } ], "release_date": "2019-08-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-04-28T15:43:14+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2020:1769" }, { "category": "workaround", "details": "To mitigate this issue, prevent module snd-usb-line6 from being loaded. Please see https://access.redhat.com/solutions/41278 for how to blacklist a kernel module to prevent it from loading automatically.", "product_ids": [ "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "PHYSICAL", "availabilityImpact": "HIGH", "baseScore": 4.6, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "kernel: Null pointer dereference in the sound/usb/line6/driver.c" }, { "cve": "CVE-2019-16234", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "discovery_date": "2019-10-10T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1760441" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Linux kernel. A check was not done on the alloc_workqueue return value of the iwl_trans_pcie_alloc function potentially leading to a NULL pointer dereference. This error condition could lead to a denial of service. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: null pointer dereference in drivers/net/wireless/intel/iwlwifi/pcie/trans.c", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue is rated as having Low impact because of the preconditions needed to trigger the error/resource cleanup code path (system-wide out-of-memory condition, high privileges or physical access). The attacker would have to be able to induce system-wide out-of-memory condition which itself could be seen as a local denial of service. It could be argued that having such privileges has the same impact as the flaw itself.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-16234" }, { "category": "external", "summary": "RHBZ#1760441", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1760441" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-16234", "url": "https://www.cve.org/CVERecord?id=CVE-2019-16234" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-16234", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-16234" }, { "category": "external", "summary": "https://lkml.org/lkml/2019/9/9/487", "url": "https://lkml.org/lkml/2019/9/9/487" } ], "release_date": "2019-09-09T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-04-28T15:43:14+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2020:1769" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 4.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "kernel: null pointer dereference in drivers/net/wireless/intel/iwlwifi/pcie/trans.c" }, { "cve": "CVE-2019-16746", "cwe": { "id": "CWE-120", "name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)" }, "discovery_date": "2019-09-26T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1760306" } ], "notes": [ { "category": "description", "text": "A flaw in the Linux kernel\u0027s WiFi beacon validation code was discovered. The code does not check the length of the variable length elements in the beacon head potentially leading to a buffer overflow. System availability, as well as data confidentiality and integrity, can be impacted by this vulnerability.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: buffer-overflow hardening in WiFi beacon validation code.", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-16746" }, { "category": "external", "summary": "RHBZ#1760306", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1760306" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-16746", "url": "https://www.cve.org/CVERecord?id=CVE-2019-16746" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-16746", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-16746" } ], "release_date": "2019-09-11T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-04-28T15:43:14+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2020:1769" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 8.4, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: buffer-overflow hardening in WiFi beacon validation code." }, { "cve": "CVE-2019-17053", "cwe": { "id": "CWE-250", "name": "Execution with Unnecessary Privileges" }, "discovery_date": "2019-10-03T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1758242" } ], "notes": [ { "category": "description", "text": "A vulnerability was discovered in the Linux kernel\u0027s AF_IEEE802154 networking module where permissions checks are not enforced. This can allow an unprivileged user to create raw sockets for this protocol leading to the potential for data leaks or system unavailability.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: unprivileged users able to create RAW sockets in AF_IEEE802154 network protocol", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw is rated as moderate; there are no known exploits using this mechanism as an attack surface against the system affected by this bug.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-17053" }, { "category": "external", "summary": "RHBZ#1758242", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1758242" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-17053", "url": "https://www.cve.org/CVERecord?id=CVE-2019-17053" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-17053", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-17053" } ], "release_date": "2019-09-20T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-04-28T15:43:14+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2020:1769" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 4.0, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L", "version": "3.0" }, "products": [ "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: unprivileged users able to create RAW sockets in AF_IEEE802154 network protocol" }, { "cve": "CVE-2019-17055", "cwe": { "id": "CWE-250", "name": "Execution with Unnecessary Privileges" }, "discovery_date": "2019-10-03T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1758248" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in the Linux kernel\u2019s implementation of the AF_ISDN protocol, which does not enforce the CAP_NET_RAW capability. This flaw can allow unprivileged users to create a raw socket for this protocol. This could further allow the user to control the availability of an existing ISDN circuit.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: unprivileged users able to create RAW sockets in AF_ISDN network protocol", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-17055" }, { "category": "external", "summary": "RHBZ#1758248", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1758248" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-17055", "url": "https://www.cve.org/CVERecord?id=CVE-2019-17055" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-17055", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-17055" } ], "release_date": "2019-09-20T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-04-28T15:43:14+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2020:1769" }, { "category": "workaround", "details": "At this time the only known way to \u0027mitigate\u0027 this flaw is to blacklist the kernel module from being loaded. Creating raw sockets with this protocol is a method of communicating with ISDN hardware, a technology that is becoming less and less common.\n\nCheck https://access.redhat.com/solutions/41278 for instructions on how to disable the mISDN_core.ko module.", "product_ids": [ "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 4.0, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: unprivileged users able to create RAW sockets in AF_ISDN network protocol" }, { "cve": "CVE-2019-18282", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2020-01-17T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1796360" } ], "notes": [ { "category": "description", "text": "A device tracking vulnerability was found in the flow_dissector feature in the Linux kernel. This flaw occurs because the auto flowlabel of the UDP IPv6 packet relies on a 32-bit hashmd value as a secret, and jhash (instead of siphash) is used. The hashmd value remains the same starting from boot time and can be inferred by an attacker.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: The flow_dissector feature allows device tracking", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-18282" }, { "category": "external", "summary": "RHBZ#1796360", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1796360" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-18282", "url": "https://www.cve.org/CVERecord?id=CVE-2019-18282" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-18282", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-18282" } ], "release_date": "2019-10-22T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-04-28T15:43:14+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2020:1769" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: The flow_dissector feature allows device tracking" }, { "cve": "CVE-2019-18805", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "discovery_date": "2019-11-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1771496" } ], "notes": [ { "category": "description", "text": "A flaw was reported in the Linux kernel\u0027s TCP subsystem while calculating a packet round trip time, when a sysctl parameter (/proc/sys/net/ipv4/tcp_min_rtt_wlen) is set incorrectly. This causes an integer overflow which can lead to a denial Of service (DOS) attack.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: integer overflow in tcp_ack_update_rtt in net/ipv4/tcp_input.c", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-18805" }, { "category": "external", "summary": "RHBZ#1771496", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1771496" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-18805", "url": "https://www.cve.org/CVERecord?id=CVE-2019-18805" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-18805", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-18805" } ], "release_date": "2019-04-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-04-28T15:43:14+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2020:1769" }, { "category": "workaround", "details": "This flaw can be mitigated by setting the sysctl parameter (/proc/sys/net/ipv4/tcp_min_rtt_wlen) with 300 which means the packet time will not exceed more then 5 minutes and which should not cause an integer overflow.", "product_ids": [ "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.3, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H", "version": "3.0" }, "products": [ "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: integer overflow in tcp_ack_update_rtt in net/ipv4/tcp_input.c" }, { "cve": "CVE-2019-19045", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-11-18T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1774983" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Linux kernel. The Mellanox Technologies Innova driver mishandles resource cleanup on error. An attacker, able to trigger error could use this flaw to crash the system. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: dos in mlx5_fpga_conn_create_cq() function in drivers/net/ethernet/mellanox/mlx5/core/fpga/conn.c", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue is rated as having Moderate impact because of the privileges needed to trigger the resource cleanup code path.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-19045" }, { "category": "external", "summary": "RHBZ#1774983", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1774983" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-19045", "url": "https://www.cve.org/CVERecord?id=CVE-2019-19045" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-19045", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-19045" } ], "release_date": "2019-11-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-04-28T15:43:14+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2020:1769" }, { "category": "workaround", "details": "In order to mitigate this issue it is possible to prevent the affected code from being loaded by blacklisting the kernel module mlx5_core. For instructions relating to how to blacklist a kernel module refer to: https://access.redhat.com/solutions/41278 .", "product_ids": [ "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "HIGH", "baseScore": 4.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: dos in mlx5_fpga_conn_create_cq() function in drivers/net/ethernet/mellanox/mlx5/core/fpga/conn.c" }, { "cve": "CVE-2019-19047", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-11-18T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1774991" } ], "notes": [ { "category": "description", "text": "A flaw was found in the way the Mellanox 5th generation network adapters (ConnectX series) core driver in the Linux kernel handled resource cleanup in the mlx5_fw_fatal_reporter_dump function. This flaw allows an attacker with the ability to trigger errors in the mlx5_crdump_collect function to crash the system.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: dos in mlx5_fw_fatal_reporter_dump() function in drivers/net/ethernet/mellanox/mlx5/core/health.c", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue is rated as having Low impact because of the preconditions needed to trigger the resource cleanup code path.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-19047" }, { "category": "external", "summary": "RHBZ#1774991", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1774991" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-19047", "url": "https://www.cve.org/CVERecord?id=CVE-2019-19047" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-19047", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-19047" } ], "release_date": "2019-11-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-04-28T15:43:14+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2020:1769" }, { "category": "workaround", "details": "In order to mitigate this issue it is possible to prevent the affected code from being loaded by blacklisting the kernel module mlx5_core. For instructions relating to how to blacklist a kernel module refer to: https://access.redhat.com/solutions/41278 .", "product_ids": [ "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "kernel: dos in mlx5_fw_fatal_reporter_dump() function in drivers/net/ethernet/mellanox/mlx5/core/health.c" }, { "cve": "CVE-2019-19055", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-11-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1775074" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Linux kernel. The Wireless configuration API functionality mishandles resource cleanup in nl80211_get_ftm_responder_stats function. An attacker able to trigger the resource cleanup code path could use this flaw to crash the system. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: memory leak in the nl80211_get_ftm_responder_stats() function in net/wireless/nl80211.c allows DoS", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue is rated as having Moderate impact because of the preconditions needed to trigger the resource cleanup code path.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-19055" }, { "category": "external", "summary": "RHBZ#1775074", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1775074" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-19055", "url": "https://www.cve.org/CVERecord?id=CVE-2019-19055" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-19055", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-19055" } ], "release_date": "2019-10-05T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-04-28T15:43:14+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2020:1769" }, { "category": "workaround", "details": "In order to mitigate this issue it is possible to prevent the affected code from being loaded by blacklisting the kernel module cfg80211. For instructions relating to how to blacklist a kernel module refer to: https://access.redhat.com/solutions/41278 .", "product_ids": [ "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: memory leak in the nl80211_get_ftm_responder_stats() function in net/wireless/nl80211.c allows DoS" }, { "cve": "CVE-2019-19057", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-11-18T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1775050" } ], "notes": [ { "category": "description", "text": "Two memory leak flaws were found in the Linux kernel\u0027s mwifiex_pcie_init_evt_ring() function. A local attacker, able to reload the kernel module or hotplug Marvell WiFi hardware using this driver, can cause a denial of service (memory consumption) by triggering mwifiex_map_pci_memory() failures.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: Two memory leaks in the mwifiex_pcie_init_evt_ring() function in drivers/net/wireless/marvell/mwifiex/pcie.c allows for a DoS", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-19057" }, { "category": "external", "summary": "RHBZ#1775050", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1775050" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-19057", "url": "https://www.cve.org/CVERecord?id=CVE-2019-19057" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-19057", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-19057" } ], "release_date": "2019-11-21T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-04-28T15:43:14+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2020:1769" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 4.0, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "kernel: Two memory leaks in the mwifiex_pcie_init_evt_ring() function in drivers/net/wireless/marvell/mwifiex/pcie.c allows for a DoS" }, { "cve": "CVE-2019-19058", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-11-18T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1775047" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Linux kernel. The Intel Wireless WiFi MVM Firmware driver mishandles resource cleanup during device coredump. An attacker able to trigger the device coredump and system-wide out of memory conditions at the same time could use this flaw to crash the system. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: A memory leak in the alloc_sgtable() function in drivers/net/wireless/intel/iwlwifi/fw/dbg.c allows for a DoS", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue is rated as having Low impact because of the preconditions needed to trigger the resource cleanup code path (system-wide out-of-memory condition).", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-19058" }, { "category": "external", "summary": "RHBZ#1775047", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1775047" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-19058", "url": "https://www.cve.org/CVERecord?id=CVE-2019-19058" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-19058", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-19058" } ], "release_date": "2019-11-21T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-04-28T15:43:14+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2020:1769" }, { "category": "workaround", "details": "In order to mitigate this issue it is possible to prevent the affected code from being loaded by blacklisting the kernel module iwlmvm. For instructions relating to how to blacklist a kernel module refer to: https://access.redhat.com/solutions/41278 .", "product_ids": [ "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 4.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "kernel: A memory leak in the alloc_sgtable() function in drivers/net/wireless/intel/iwlwifi/fw/dbg.c allows for a DoS" }, { "cve": "CVE-2019-19059", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-11-18T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1775042" } ], "notes": [ { "category": "description", "text": "A flaw was found in the way the Intel Wireless driver in the Linux kernel handled resource cleanup during Gen 3 device initialization. This flaw allows an attacker with the ability to restrict access to DMA coherent memory on device initialization, to crash the system.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: Multiple memory leaks in the iwl_pcie_ctxt_info_gen3_init() function in drivers/net/wireless/intel/iwlwifi/pcie/ctxt-info-gen3.c allows for a DoS", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue is rated as having Low impact because of the preconditions needed to trigger the resource cleanup code path (ability to restrict access to dma coherent memory on device initialization).", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-19059" }, { "category": "external", "summary": "RHBZ#1775042", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1775042" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-19059", "url": "https://www.cve.org/CVERecord?id=CVE-2019-19059" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-19059", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-19059" } ], "release_date": "2019-11-21T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-04-28T15:43:14+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2020:1769" }, { "category": "workaround", "details": "In order to mitigate this issue it is possible to prevent the affected code from being loaded by blacklisting the kernel module iwlwifi. For instructions relating to how to blacklist a kernel module refer to: https://access.redhat.com/solutions/41278 .", "product_ids": [ "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 4.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "kernel: Multiple memory leaks in the iwl_pcie_ctxt_info_gen3_init() function in drivers/net/wireless/intel/iwlwifi/pcie/ctxt-info-gen3.c allows for a DoS" }, { "cve": "CVE-2019-19065", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-11-18T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1775000" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Linux kernel. The Intel OPA Gen1 driver mishandles resource cleanup. An attacker able to induce low memory condition on the system could use this flaw to crash the system. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: A memory leak in the sdma_init() function in drivers/infiniband/hw/hfi1/sdma.c allows for a DoS", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue is rated as having Low impact because of the preconditions needed to trigger the resource cleanup code path (system-wide out-of-memory condition).", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-19065" }, { "category": "external", "summary": "RHBZ#1775000", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1775000" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-19065", "url": "https://www.cve.org/CVERecord?id=CVE-2019-19065" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-19065", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-19065" } ], "release_date": "2019-11-21T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-04-28T15:43:14+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2020:1769" }, { "category": "workaround", "details": "In order to mitigate this issue it is possible to prevent the affected code from being loaded by blacklisting the kernel module hfi1. For instructions relating to how to blacklist a kernel module refer to: https://access.redhat.com/solutions/41278 .", "product_ids": [ "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 4.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "kernel: A memory leak in the sdma_init() function in drivers/infiniband/hw/hfi1/sdma.c allows for a DoS" }, { "cve": "CVE-2019-19067", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-11-18T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1774968" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Linux kernel. The acp_hw_init function fails to cleanup resources properly. A local attacker can induce an error condition to crash the system. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: Four memory leaks in the acp_hw_init() function in drivers/gpu/drm/amd/amdgpu/amdgpu_acp.c allow for a DoS", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue is rated as having Low impact because of the preconditions needed to trigger the error/resource cleanup code path.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-19067" }, { "category": "external", "summary": "RHBZ#1774968", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1774968" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-19067", "url": "https://www.cve.org/CVERecord?id=CVE-2019-19067" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-19067", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-19067" } ], "release_date": "2019-11-21T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-04-28T15:43:14+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2020:1769" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 4.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "kernel: Four memory leaks in the acp_hw_init() function in drivers/gpu/drm/amd/amdgpu/amdgpu_acp.c allow for a DoS" }, { "cve": "CVE-2019-19073", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-11-18T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1774937" } ], "notes": [ { "category": "description", "text": "Memory leaks in drivers/net/wireless/ath/ath9k/htc_hst.c in the Linux kernel through 5.3.11 allow attackers to cause a denial of service (memory consumption) by triggering wait_for_completion_timeout() failures. This affects the htc_config_pipe_credits() function, the htc_setup_complete() function, and the htc_connect_service() function, aka CID-853acf7caf10.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: Memory leaks in drivers/net/wireless/ath/ath9k/htc_hst.c in the Linux kernel (DOS)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-19073" }, { "category": "external", "summary": "RHBZ#1774937", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1774937" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-19073", "url": "https://www.cve.org/CVERecord?id=CVE-2019-19073" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-19073", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-19073" } ], "release_date": "2019-11-21T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-04-28T15:43:14+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2020:1769" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 4.0, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "kernel: Memory leaks in drivers/net/wireless/ath/ath9k/htc_hst.c in the Linux kernel (DOS)" }, { "cve": "CVE-2019-19074", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "discovery_date": "2019-11-18T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1774933" } ], "notes": [ { "category": "description", "text": "A memory leak in the ath9k_wmi_cmd() function in drivers/net/wireless/ath/ath9k/wmi.c in the Linux kernel through 5.3.11 allows attackers to cause a denial of service (memory consumption), aka CID-728c1e2a05e4.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: a memory leak in the ath9k management function in allows local DoS", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-19074" }, { "category": "external", "summary": "RHBZ#1774933", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1774933" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-19074", "url": "https://www.cve.org/CVERecord?id=CVE-2019-19074" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-19074", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-19074" } ], "release_date": "2019-11-21T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-04-28T15:43:14+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2020:1769" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "kernel: a memory leak in the ath9k management function in allows local DoS" }, { "cve": "CVE-2019-19077", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-11-22T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1775724" } ], "notes": [ { "category": "description", "text": "A memory leak flaw was found in the Broadcom NetXtreme HCA driver in the Linux kernel, in the way it handled resource cleanup on the copy to userspace error. This flaw allows a local attacker to trigger this error and crash the system.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: memory leak in bnxt_re_create_srq function in drivers/infiniband/hw/bnxt_re/ib_verbs.c", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue is rated as having Moderate impact because local attacker is needed in order to trigger it.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-19077" }, { "category": "external", "summary": "RHBZ#1775724", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1775724" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-19077", "url": "https://www.cve.org/CVERecord?id=CVE-2019-19077" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-19077", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-19077" } ], "release_date": "2019-09-10T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-04-28T15:43:14+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2020:1769" }, { "category": "workaround", "details": "In order to mitigate this issue it is possible to prevent the affected code from being loaded by blacklisting the kernel module bnxt_re. For instructions relating to how to blacklist a kernel module refer to: https://access.redhat.com/solutions/41278 .", "product_ids": [ "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: memory leak in bnxt_re_create_srq function in drivers/infiniband/hw/bnxt_re/ib_verbs.c" }, { "cve": "CVE-2019-19532", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "discovery_date": "2019-12-10T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1781821" } ], "notes": [ { "category": "description", "text": "An out-of-bounds write flaw was found in the Linux kernel\u2019s HID drivers. An attacker, able to plug in a malicious USB device, can crash the system or read and write to memory with an incorrect address.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: malicious USB devices can lead to multiple out-of-bounds write", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue was rated as having Moderate impact because of the need of physical access to trigger it.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-19532" }, { "category": "external", "summary": "RHBZ#1781821", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1781821" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-19532", "url": "https://www.cve.org/CVERecord?id=CVE-2019-19532" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-19532", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-19532" } ], "release_date": "2019-12-03T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-04-28T15:43:14+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2020:1769" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "PHYSICAL", "availabilityImpact": "HIGH", "baseScore": 6.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: malicious USB devices can lead to multiple out-of-bounds write" }, { "cve": "CVE-2019-19534", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2019-12-04T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1783540" } ], "notes": [ { "category": "description", "text": "An information-leak flaw was found in the Linux kernel\u0027s pcan USB driver. When a device using this driver connects to the system, the stack information is leaked to the CAN bus, a controller area network for automobiles. The highest threat with this vulnerability is breach of data confidentiality.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: information leak bug caused by a malicious USB device in the drivers/net/can/usb/peak_usb/pcan_usb_core.c driver", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-19534" }, { "category": "external", "summary": "RHBZ#1783540", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1783540" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-19534", "url": "https://www.cve.org/CVERecord?id=CVE-2019-19534" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-19534", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-19534" } ], "release_date": "2019-11-04T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-04-28T15:43:14+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2020:1769" }, { "category": "workaround", "details": "As the devices module will be auto-loaded when the USB CAN bus adapter is connected, its can be disabled by preventing the module from loading with the following instructions:\n\n# echo \"install peak_usb /bin/true\" \u003e\u003e /etc/modprobe.d/disable-peak-usb-canbus.conf \n \nThe system will need to be restarted if the peak_usb module is already loaded. In most circumstances, the kernel modules will be unable to be unloaded while any CAN bus interfaces are active and the protocol is in use. If the system requires this module to work correctly, this mitigation may not be suitable. If you need further assistance, see KCS article https://access.redhat.com/solutions/41278 or contact Red Hat Global Support Services.", "product_ids": [ "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "PHYSICAL", "availabilityImpact": "NONE", "baseScore": 4.6, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: information leak bug caused by a malicious USB device in the drivers/net/can/usb/peak_usb/pcan_usb_core.c driver" }, { "cve": "CVE-2019-19768", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2019-12-23T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1786164" } ], "notes": [ { "category": "description", "text": "A use-after-free vulnerability was found in the Linux kernel\u2019s implementation of blktrace in the __blk_add_trace function. A local attacker with permissions to run block trace instructions against a device can create a situation where the core block_trace object is used after it is freed. The attacker can pre-groom memory to race this use-after-free to create a condition where the memory is corrupted and cause privilege escalation.\r\n\r\nThe ability to create this condition requires elevated privileges, and it has been decided that this change in Red Hat Enterprise Linux 5 and 6 would risk introducing possible regressions and will not be backported.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: use-after-free in __blk_add_trace in kernel/trace/blktrace.c", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-19768" }, { "category": "external", "summary": "RHBZ#1786164", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1786164" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-19768", "url": "https://www.cve.org/CVERecord?id=CVE-2019-19768" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-19768", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-19768" } ], "release_date": "2019-11-29T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-04-28T15:43:14+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2020:1769" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: use-after-free in __blk_add_trace in kernel/trace/blktrace.c" }, { "cve": "CVE-2019-19922", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2020-01-17T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1792512" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Linux kernel\u2019s scheduler, where it can allow attackers to cause a denial of service against non-CPU-bound applications by generating a workload that triggers unwanted scheduling slice expiration. A local attacker who can trigger a specific workload type could abuse this technique to trigger a system to be seen as degraded, and possibly trigger workload-rebalance in systems that use the slice-expiration metric as a measure of system health.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: when cpu.cfs_quota_us is used allows attackers to cause a denial of service against non-cpu-bound applications", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-19922" }, { "category": "external", "summary": "RHBZ#1792512", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1792512" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-19922", "url": "https://www.cve.org/CVERecord?id=CVE-2019-19922" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-19922", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-19922" } ], "release_date": "2019-12-22T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-04-28T15:43:14+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2020:1769" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "kernel: when cpu.cfs_quota_us is used allows attackers to cause a denial of service against non-cpu-bound applications" }, { "acknowledgments": [ { "names": [ "Xiumei Mu" ], "organization": "Red Hat QE Engineering", "summary": "This issue was discovered by Red Hat." } ], "cve": "CVE-2020-1749", "cwe": { "id": "CWE-319", "name": "Cleartext Transmission of Sensitive Information" }, "discovery_date": "2020-03-04T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1809833" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Linux kernel\u0027s implementation of some networking protocols in IPsec, such as VXLAN and GENEVE tunnels over IPv6. When an encrypted tunnel is created between two hosts, the kernel isn\u0027t correctly routing tunneled data over the encrypted link; rather sending the data unencrypted. This would allow anyone in between the two endpoints to read the traffic unencrypted. The main threat from this vulnerability is to data confidentiality.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: some ipv6 protocols not encrypted over ipsec tunnel", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-1749" }, { "category": "external", "summary": "RHBZ#1809833", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1809833" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-1749", "url": "https://www.cve.org/CVERecord?id=CVE-2020-1749" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-1749", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-1749" } ], "release_date": "2020-03-04T01:29:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-04-28T15:43:14+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2020:1769" }, { "category": "workaround", "details": "Disabling the IPV6 protocol may be a suitable workaround for systems that do not require the protocol to function correctly, however, if IPV6 is not in use this flaw will not be triggered.", "product_ids": [ "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: some ipv6 protocols not encrypted over ipsec tunnel" }, { "cve": "CVE-2020-7053", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2020-01-28T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1795624" } ], "notes": [ { "category": "description", "text": "A use-after-free flaw was found in the Linux kernel\u2019s GPU driver functionality when destroying GEM context. A local user could use this flaw to crash the system or potentially escalate their privileges.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: use-after-free in i915_ppgtt_close in drivers/gpu/drm/i915/i915_gem_gtt.c", "title": "Vulnerability summary" }, { "category": "other", "text": "The impact of this issue is Moderate, because attack is specific for certain Intel hardware and could be triggered only by local user with write access to the device.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-7053" }, { "category": "external", "summary": "RHBZ#1795624", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1795624" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-7053", "url": "https://www.cve.org/CVERecord?id=CVE-2020-7053" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-7053", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-7053" } ], "release_date": "2020-01-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-04-28T15:43:14+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2020:1769" }, { "category": "workaround", "details": "In case of dedicated graphic card presence and i915 GPU is not being used, you can prevent module i915 from being loaded. Please see https://access.redhat.com/solutions/41278 for how to blacklist a kernel module to prevent it from loading automatically.", "product_ids": [ "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: use-after-free in i915_ppgtt_close in drivers/gpu/drm/i915/i915_gem_gtt.c" }, { "cve": "CVE-2020-10690", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2019-11-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1817141" } ], "notes": [ { "category": "description", "text": "There is a use-after-free problem seen due to a race condition between the release of ptp_clock and cdev while resource deallocation. When a (high privileged) process allocates a ptp device file (like /dev/ptpX) and voluntarily goes to sleep. During this time if the underlying device is removed, it can cause an exploitable condition as the process wakes up to terminate and clean all attached files. The system crashes due to the cdev structure being invalid (as already freed) which is pointed to by the inode.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: use-after-free in cdev_put() when a PTP device is removed while it\u0027s chardev is open", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue is rated as having Low impact as there is a need for high privilege access to trigger this problem. This will need an access to /dev/ptpX which is privileged operation, also removing the module is needed (again, privileged operation).", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-10690" }, { "category": "external", "summary": "RHBZ#1817141", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1817141" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-10690", "url": "https://www.cve.org/CVERecord?id=CVE-2020-10690" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-10690", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-10690" } ], "release_date": "2019-11-25T12:53:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-04-28T15:43:14+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2020:1769" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "kernel: use-after-free in cdev_put() when a PTP device is removed while it\u0027s chardev is open" }, { "cve": "CVE-2021-33630", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "discovery_date": "2024-01-30T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2261974" } ], "notes": [ { "category": "description", "text": "A NULL pointer dereference flaw was found in the Linux kernel\u0027s network scheduler. This issue occurs when offloading is enabled, the cbs instance is not added to the list. The code also incorrectly handles the case when offload is disabled without removing the qdisc. This could allow a local user to cause a denial of service condition.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: net/sched: cbs NULL pointer dereference when offloading is enabled", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-33630" }, { "category": "external", "summary": "RHBZ#2261974", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2261974" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-33630", "url": "https://www.cve.org/CVERecord?id=CVE-2021-33630" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-33630", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-33630" }, { "category": "external", "summary": "https://seclists.org/oss-sec/2024/q1/65", "url": "https://seclists.org/oss-sec/2024/q1/65" } ], "release_date": "2024-01-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-04-28T15:43:14+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2020:1769" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: net/sched: cbs NULL pointer dereference when offloading is enabled" } ] }
rhsa-2020_1567
Vulnerability from csaf_redhat
Published
2020-04-28 15:41
Modified
2024-11-15 11:44
Summary
Red Hat Security Advisory: kernel-rt security, bug fix, and enhancement update
Notes
Topic
An update for kernel-rt is now available for Red Hat Enterprise Linux 8.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements.
Security Fix(es):
* kernel: use-after-free in __blk_add_trace in kernel/trace/blktrace.c (CVE-2019-19768)
* kernel: nfs: NULL pointer dereference due to an anomalized NFS message sequence (CVE-2018-16871)
* kernel: memory leak in the kernel_read_file function in fs/exec.c allows to cause a denial of service (CVE-2019-8980)
* kernel: unprivileged users able to create RAW sockets in AF_IEEE802154 network protocol. (CVE-2019-17053)
* kernel: unprivileged users able to create RAW sockets in AF_ISDN network protocol. (CVE-2019-17055)
* kernel: integer overflow in tcp_ack_update_rtt in net/ipv4/tcp_input.c (CVE-2019-18805)
* kernel: information leak bug caused by a malicious USB device in the drivers/net/can/usb/peak_usb/pcan_usb_core.c driver (CVE-2019-19534)
* kernel: some ipv6 protocols not encrypted over ipsec tunnel. (CVE-2020-1749)
* Kernel: net: using kernel space address bits to derive IP ID may potentially break KASLR (CVE-2019-10639)
* kernel: An out-of-bounds read in drivers/scsi/qedi/qedi_dbg.c leading to crash or information disclosure (CVE-2019-15090)
* kernel: a NULL pointer dereference in drivers/net/wireless/ath/ath10k/usb.c leads to a crash (CVE-2019-15099)
* kernel: Null pointer dereference in the sound/usb/line6/pcm.c (CVE-2019-15221)
* kernel: Two memory leaks in the mwifiex_pcie_init_evt_ring() function in drivers/net/wireless/marvell/mwifiex/pcie.c allows for a DoS (CVE-2019-19057)
* kernel: Memory leaks in drivers/net/wireless/ath/ath9k/htc_hst.c in the Linux kernel (DOS) (CVE-2019-19073)
* kernel: a memory leak in the ath9k management function in allows local DoS (CVE-2019-19074)
* kernel: when cpu.cfs_quota_us is used allows attackers to cause a denial of service against non-cpu-bound applications (CVE-2019-19922)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
* RT: update RT source tree to the RHEL-8.2 tree (BZ#1708716)
* KVM-RT guest fails boot with emulatorsched (BZ#1712781)
* 8 vCPU guest need max latency < 20 us with stress [RT-8.2] (BZ#1757165)
* Request nx_huge_pages=N as default value to avoid kvm-rt guest large latency spike [rt-8] (BZ#1788352)
* RT: Add rpm Provide of 'kernel' to indicate that this is a kernel package (BZ#1796284)
* [RHEL8] RT kernel signed by test certificate and not Red Hat Secure Boot (BZ#1806871)
Enhancement(s):
* update to the upstream 5.x RT patchset (BZ#1680161)
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for kernel-rt is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements.\n\nSecurity Fix(es):\n\n* kernel: use-after-free in __blk_add_trace in kernel/trace/blktrace.c (CVE-2019-19768)\n\n* kernel: nfs: NULL pointer dereference due to an anomalized NFS message sequence (CVE-2018-16871)\n\n* kernel: memory leak in the kernel_read_file function in fs/exec.c allows to cause a denial of service (CVE-2019-8980)\n\n* kernel: unprivileged users able to create RAW sockets in AF_IEEE802154 network protocol. (CVE-2019-17053)\n\n* kernel: unprivileged users able to create RAW sockets in AF_ISDN network protocol. (CVE-2019-17055)\n\n* kernel: integer overflow in tcp_ack_update_rtt in net/ipv4/tcp_input.c (CVE-2019-18805)\n\n* kernel: information leak bug caused by a malicious USB device in the drivers/net/can/usb/peak_usb/pcan_usb_core.c driver (CVE-2019-19534)\n\n* kernel: some ipv6 protocols not encrypted over ipsec tunnel. (CVE-2020-1749)\n\n* Kernel: net: using kernel space address bits to derive IP ID may potentially break KASLR (CVE-2019-10639)\n\n* kernel: An out-of-bounds read in drivers/scsi/qedi/qedi_dbg.c leading to crash or information disclosure (CVE-2019-15090)\n\n* kernel: a NULL pointer dereference in drivers/net/wireless/ath/ath10k/usb.c leads to a crash (CVE-2019-15099)\n\n* kernel: Null pointer dereference in the sound/usb/line6/pcm.c (CVE-2019-15221)\n\n* kernel: Two memory leaks in the mwifiex_pcie_init_evt_ring() function in drivers/net/wireless/marvell/mwifiex/pcie.c allows for a DoS (CVE-2019-19057)\n\n* kernel: Memory leaks in drivers/net/wireless/ath/ath9k/htc_hst.c in the Linux kernel (DOS) (CVE-2019-19073)\n\n* kernel: a memory leak in the ath9k management function in allows local DoS (CVE-2019-19074)\n\n* kernel: when cpu.cfs_quota_us is used allows attackers to cause a denial of service against non-cpu-bound applications (CVE-2019-19922)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nBug Fix(es):\n\n* RT: update RT source tree to the RHEL-8.2 tree (BZ#1708716)\n\n* KVM-RT guest fails boot with emulatorsched (BZ#1712781)\n\n* 8 vCPU guest need max latency \u003c 20 us with stress [RT-8.2] (BZ#1757165)\n\n* Request nx_huge_pages=N as default value to avoid kvm-rt guest large latency spike [rt-8] (BZ#1788352)\n\n* RT: Add rpm Provide of \u0027kernel\u0027 to indicate that this is a kernel package (BZ#1796284)\n\n* [RHEL8] RT kernel signed by test certificate and not Red Hat Secure Boot (BZ#1806871)\n\nEnhancement(s):\n\n* update to the upstream 5.x RT patchset (BZ#1680161)", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2020:1567", "url": "https://access.redhat.com/errata/RHSA-2020:1567" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/8/html/8.2_release_notes/index", "url": "https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/8/html/8.2_release_notes/index" }, { "category": "external", "summary": "1655162", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1655162" }, { "category": "external", "summary": "1679972", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1679972" }, { "category": "external", "summary": "1708716", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1708716" }, { "category": "external", "summary": "1712781", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1712781" }, { "category": "external", "summary": "1729933", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1729933" }, { "category": "external", "summary": "1743526", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1743526" }, { "category": "external", "summary": "1743560", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1743560" }, { "category": "external", "summary": "1749974", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1749974" }, { "category": "external", "summary": "1757165", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1757165" }, { "category": "external", "summary": "1758242", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1758242" }, { "category": "external", "summary": "1758248", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1758248" }, { "category": "external", "summary": "1768730", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1768730" }, { "category": "external", "summary": "1771496", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1771496" }, { "category": "external", "summary": "1772738", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1772738" }, { "category": "external", "summary": "1774933", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1774933" }, { "category": "external", "summary": "1774937", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1774937" }, { "category": "external", "summary": "1775050", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1775050" }, { "category": "external", "summary": "1783540", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1783540" }, { "category": "external", "summary": "1786164", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1786164" }, { "category": "external", "summary": "1788352", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1788352" }, { "category": "external", "summary": "1792512", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1792512" }, { "category": "external", "summary": "1796284", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1796284" }, { "category": "external", "summary": "1806871", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1806871" }, { "category": "external", "summary": "1809833", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1809833" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2020/rhsa-2020_1567.json" } ], "title": "Red Hat Security Advisory: kernel-rt security, bug fix, and enhancement update", "tracking": { "current_release_date": "2024-11-15T11:44:53+00:00", "generator": { "date": "2024-11-15T11:44:53+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2020:1567", "initial_release_date": "2020-04-28T15:41:38+00:00", "revision_history": [ { "date": "2020-04-28T15:41:38+00:00", "number": "1", "summary": "Initial version" }, { "date": "2020-04-28T15:41:38+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-15T11:44:53+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux Real Time for NFV (v. 8)", "product": { "name": "Red Hat Enterprise Linux Real Time for NFV (v. 8)", "product_id": "NFV-8.2.0.GA", "product_identification_helper": { "cpe": "cpe:/a:redhat:enterprise_linux:8::nfv" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Real Time (v. 8)", "product": { "name": "Red Hat Enterprise Linux Real Time (v. 8)", "product_id": "RT-8.2.0.GA", "product_identification_helper": { "cpe": "cpe:/a:redhat:enterprise_linux:8::realtime" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "product": { "name": "kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "product_id": "kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt@4.18.0-193.rt13.51.el8?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "product": { "name": "kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "product_id": "kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-core@4.18.0-193.rt13.51.el8?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "product": { "name": "kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "product_id": "kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debug@4.18.0-193.rt13.51.el8?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "product": { "name": "kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "product_id": "kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debug-core@4.18.0-193.rt13.51.el8?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "product": { "name": "kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "product_id": "kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debug-devel@4.18.0-193.rt13.51.el8?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "product": { "name": "kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "product_id": "kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debug-modules@4.18.0-193.rt13.51.el8?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "product": { "name": "kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "product_id": "kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debug-modules-extra@4.18.0-193.rt13.51.el8?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "product": { "name": "kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "product_id": "kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-devel@4.18.0-193.rt13.51.el8?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "product": { "name": "kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "product_id": "kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-modules@4.18.0-193.rt13.51.el8?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "product": { "name": "kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "product_id": "kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-modules-extra@4.18.0-193.rt13.51.el8?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "product": { "name": "kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "product_id": "kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debug-debuginfo@4.18.0-193.rt13.51.el8?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "product": { "name": "kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "product_id": "kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debuginfo@4.18.0-193.rt13.51.el8?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "product": { "name": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "product_id": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debuginfo-common-x86_64@4.18.0-193.rt13.51.el8?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "product": { "name": "kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "product_id": "kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debug-kvm@4.18.0-193.rt13.51.el8?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "product": { "name": "kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "product_id": "kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-kvm@4.18.0-193.rt13.51.el8?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "kernel-rt-0:4.18.0-193.rt13.51.el8.src", "product": { "name": "kernel-rt-0:4.18.0-193.rt13.51.el8.src", "product_id": "kernel-rt-0:4.18.0-193.rt13.51.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt@4.18.0-193.rt13.51.el8?arch=src" } } } ], "category": "architecture", "name": "src" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-0:4.18.0-193.rt13.51.el8.src as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)", "product_id": "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src" }, "product_reference": "kernel-rt-0:4.18.0-193.rt13.51.el8.src", "relates_to_product_reference": "NFV-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)", "product_id": "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64" }, "product_reference": "kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "relates_to_product_reference": "NFV-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)", "product_id": "NFV-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64" }, "product_reference": "kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "relates_to_product_reference": "NFV-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)", "product_id": "NFV-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64" }, "product_reference": "kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "relates_to_product_reference": "NFV-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)", "product_id": "NFV-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64" }, "product_reference": "kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "relates_to_product_reference": "NFV-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)", "product_id": "NFV-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64" }, "product_reference": "kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "relates_to_product_reference": "NFV-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)", "product_id": "NFV-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64" }, "product_reference": "kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "relates_to_product_reference": "NFV-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)", "product_id": "NFV-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64" }, "product_reference": "kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "relates_to_product_reference": "NFV-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)", "product_id": "NFV-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64" }, "product_reference": "kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "relates_to_product_reference": "NFV-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)", "product_id": "NFV-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64" }, "product_reference": "kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "relates_to_product_reference": "NFV-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)", "product_id": "NFV-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64" }, "product_reference": "kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "relates_to_product_reference": "NFV-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)", "product_id": "NFV-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64" }, "product_reference": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "relates_to_product_reference": "NFV-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)", "product_id": "NFV-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64" }, "product_reference": "kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "relates_to_product_reference": "NFV-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)", "product_id": "NFV-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64" }, "product_reference": "kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "relates_to_product_reference": "NFV-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)", "product_id": "NFV-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64" }, "product_reference": "kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "relates_to_product_reference": "NFV-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)", "product_id": "NFV-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64" }, "product_reference": "kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "relates_to_product_reference": "NFV-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-0:4.18.0-193.rt13.51.el8.src as a component of Red Hat Enterprise Linux Real Time (v. 8)", "product_id": "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src" }, "product_reference": "kernel-rt-0:4.18.0-193.rt13.51.el8.src", "relates_to_product_reference": "RT-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)", "product_id": "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64" }, "product_reference": "kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "relates_to_product_reference": "RT-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)", "product_id": "RT-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64" }, "product_reference": "kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "relates_to_product_reference": "RT-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)", "product_id": "RT-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64" }, "product_reference": "kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "relates_to_product_reference": "RT-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)", "product_id": "RT-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64" }, "product_reference": "kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "relates_to_product_reference": "RT-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)", "product_id": "RT-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64" }, "product_reference": "kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "relates_to_product_reference": "RT-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)", "product_id": "RT-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64" }, "product_reference": "kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "relates_to_product_reference": "RT-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)", "product_id": "RT-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64" }, "product_reference": "kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "relates_to_product_reference": "RT-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)", "product_id": "RT-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64" }, "product_reference": "kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "relates_to_product_reference": "RT-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)", "product_id": "RT-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64" }, "product_reference": "kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "relates_to_product_reference": "RT-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)", "product_id": "RT-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64" }, "product_reference": "kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "relates_to_product_reference": "RT-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)", "product_id": "RT-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64" }, "product_reference": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "relates_to_product_reference": "RT-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)", "product_id": "RT-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64" }, "product_reference": "kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "relates_to_product_reference": "RT-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)", "product_id": "RT-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64" }, "product_reference": "kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "relates_to_product_reference": "RT-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)", "product_id": "RT-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64" }, "product_reference": "kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "relates_to_product_reference": "RT-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)", "product_id": "RT-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64" }, "product_reference": "kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "relates_to_product_reference": "RT-8.2.0.GA" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "Hangbin Liu" ], "organization": "Red Hat", "summary": "This issue was discovered by Red Hat." }, { "names": [ "Jasu Liedes" ], "organization": "Synopsys SIG" } ], "cve": "CVE-2018-16871", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "discovery_date": "2018-11-21T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1655162" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Linux kernel\u0027s NFS implementation. An attacker, who is able to mount an exported NFS filesystem, is able to trigger a null pointer dereference by using an invalid NFS sequence. This can panic the machine and deny access to the NFS server. Any outstanding disk writes to the NFS server will be lost.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: nfs: NULL pointer dereference due to an anomalized NFS message sequence", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-16871" }, { "category": "external", "summary": "RHBZ#1655162", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1655162" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-16871", "url": "https://www.cve.org/CVERecord?id=CVE-2018-16871" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-16871", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-16871" } ], "release_date": "2019-06-03T02:23:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-04-28T15:41:38+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:1567" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: nfs: NULL pointer dereference due to an anomalized NFS message sequence" }, { "cve": "CVE-2019-5108", "cwe": { "id": "CWE-440", "name": "Expected Behavior Violation" }, "discovery_date": "2020-01-10T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1789927" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Linux kernel\u2019s implementation of the WiFi station handoff code. An attacker within the radio range could use this flaw to deny a valid device from joining the access point.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: triggering AP to send IAPP location updates for stations before the required authentication process has completed can lead to DoS", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-5108" }, { "category": "external", "summary": "RHBZ#1789927", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1789927" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-5108", "url": "https://www.cve.org/CVERecord?id=CVE-2019-5108" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-5108", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-5108" } ], "release_date": "2019-12-11T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-04-28T15:41:38+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:1567" }, { "category": "workaround", "details": "At this time there is no known mitigations to this issue other than to install the updated kernel package.", "product_ids": [ "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: triggering AP to send IAPP location updates for stations before the required authentication process has completed can lead to DoS" }, { "cve": "CVE-2019-8980", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-02-21T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1679972" } ], "notes": [ { "category": "description", "text": "A kernel memory leak was found in the kernel_read_file() function in the fs/exec.c file in the Linux kernel. An attacker could use this flaw to cause a memory leak and thus a denial of service (DoS).", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: memory leak in the kernel_read_file function in fs/exec.c allows to cause a denial of service", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-8980" }, { "category": "external", "summary": "RHBZ#1679972", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1679972" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-8980", "url": "https://www.cve.org/CVERecord?id=CVE-2019-8980" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-8980", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-8980" } ], "release_date": "2019-02-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-04-28T15:41:38+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:1567" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: memory leak in the kernel_read_file function in fs/exec.c allows to cause a denial of service" }, { "cve": "CVE-2019-10639", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2019-07-06T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1729933" } ], "notes": [ { "category": "description", "text": "A flaw was found in the way the Linux kernel derived the IP ID field from a partial kernel space address returned by a net_hash_mix() function. A remote user could observe this IP ID field to extract the kernel\u00a0address bits used to derive its value, which may result in leaking the hash key and potentially defeating KASLR.", "title": "Vulnerability description" }, { "category": "summary", "text": "Kernel: net: using kernel space address bits to derive IP ID may potentially break KASLR", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue does not affect the versions of Linux kernel as shipped with Red Hat Enterprise Linux 5 and Red Hat Enterprise Linux 6.\n\nThis issue affects the version of Linux kernel as shipped with Red Hat Enterprise Linux 7, 8 and Red Hat Enterprise MRG 2. Future kernel updates for Red Hat Enterprise Linux 7, 8 and Red Hat Enterprise MRG 2 may address this issue.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-10639" }, { "category": "external", "summary": "RHBZ#1729933", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1729933" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-10639", "url": "https://www.cve.org/CVERecord?id=CVE-2019-10639" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-10639", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-10639" }, { "category": "external", "summary": "https://arxiv.org/pdf/1906.10478.pdf", "url": "https://arxiv.org/pdf/1906.10478.pdf" } ], "release_date": "2019-07-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-04-28T15:41:38+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:1567" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 3.7, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" }, "products": [ "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "Kernel: net: using kernel space address bits to derive IP ID may potentially break KASLR" }, { "cve": "CVE-2019-12819", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2019-06-14T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1721962" } ], "notes": [ { "category": "description", "text": "A use-after-free flaw was found in the Linux kernel\u0027s MDIO section of the network management subsystem. An attacker who is able to hot-plug a network device can trigger the __mdiobus_register() function in drivers/net/phy/mdio_bus.c, which can cause a use-after-free condition causing a memory corruption and kernel panic or privilege escalation.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: use-after-free in function __mdiobus_register() in drivers/net/phy/mdio_bus.c", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-12819" }, { "category": "external", "summary": "RHBZ#1721962", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1721962" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-12819", "url": "https://www.cve.org/CVERecord?id=CVE-2019-12819" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-12819", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-12819" } ], "release_date": "2019-06-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-04-28T15:41:38+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:1567" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 4.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N", "version": "3.0" }, "products": [ "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: use-after-free in function __mdiobus_register() in drivers/net/phy/mdio_bus.c" }, { "cve": "CVE-2019-15090", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "discovery_date": "2019-08-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1743526" } ], "notes": [ { "category": "description", "text": "An out-of-bounds (OOB) memory access flaw was found in the Qlogic ISCSI module in the Linux kernel\u0027s qedi_dbg_* family of functions in drivers/scsi/qedi/qedi_dbg.c. Here a local attacker with a special user privilege account (or a root) can cause an out-of-bound memory access leading to a system crash or a leak of internal kernel information.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: An out-of-bounds read in drivers/scsi/qedi/qedi_dbg.c leading to crash or information disclosure", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-15090" }, { "category": "external", "summary": "RHBZ#1743526", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1743526" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-15090", "url": "https://www.cve.org/CVERecord?id=CVE-2019-15090" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-15090", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-15090" } ], "release_date": "2019-08-20T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-04-28T15:41:38+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:1567" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "kernel: An out-of-bounds read in drivers/scsi/qedi/qedi_dbg.c leading to crash or information disclosure" }, { "cve": "CVE-2019-15099", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2019-08-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1743560" } ], "notes": [ { "category": "description", "text": "A null pointer dereference flaw was discovered in the Linux kernel\u0027s implementation of the ath10k USB device driver. The vulnerability requires the attacker to plug in a specially crafted hardware device that present endpoint descriptors that normal ath10k devices do not recognize. System availability is the highest threat with this vulnerability.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: a NULL pointer dereference in drivers/net/wireless/ath/ath10k/usb.c leads to a crash", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-15099" }, { "category": "external", "summary": "RHBZ#1743560", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1743560" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-15099", "url": "https://www.cve.org/CVERecord?id=CVE-2019-15099" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-15099", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-15099" } ], "release_date": "2019-08-20T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-04-28T15:41:38+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:1567" }, { "category": "workaround", "details": "As the ath10k module will be auto-loaded when required, its use can be disabled by preventing the module from loading using the following instructions.\n\nOn the command line, as root, execute the following command:\n# echo \"install ath10k_usb /bin/true\" \u003e\u003e /etc/modprobe.d/disable-ath10k_usb.conf \n \nThe system will need to be restarted if the ath10k_usb module are loaded. In most circumstances, the kernel modules will be unable to be unloaded while the ath10k WiFi network interface is in use. If the system requires this module to work correctly, this mitigation may not be suitable.\n\nIf you need further assistance, see KCS article https://access.redhat.com/solutions/41278 or contact Red Hat Global Support Services.", "product_ids": [ "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "PHYSICAL", "availabilityImpact": "HIGH", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "kernel: a NULL pointer dereference in drivers/net/wireless/ath/ath10k/usb.c leads to a crash" }, { "cve": "CVE-2019-15221", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "discovery_date": "2019-08-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1749974" } ], "notes": [ { "category": "description", "text": "A NULL pointer dereference flaw was found in the way the LINE6 drivers in the Linux kernel allocated buffers for USB packets. This flaw allows an attacker with physical access to the system to crash the system.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: Null pointer dereference in the sound/usb/line6/pcm.c", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue is rated as having Low impact because of the physical access needed to trigger this issue.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-15221" }, { "category": "external", "summary": "RHBZ#1749974", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1749974" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-15221", "url": "https://www.cve.org/CVERecord?id=CVE-2019-15221" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-15221", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-15221" } ], "release_date": "2019-08-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-04-28T15:41:38+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:1567" }, { "category": "workaround", "details": "To mitigate this issue, prevent module snd-usb-line6 from being loaded. Please see https://access.redhat.com/solutions/41278 for how to blacklist a kernel module to prevent it from loading automatically.", "product_ids": [ "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "PHYSICAL", "availabilityImpact": "HIGH", "baseScore": 4.6, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "kernel: Null pointer dereference in the sound/usb/line6/pcm.c" }, { "cve": "CVE-2019-15223", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "discovery_date": "2019-08-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1749976" } ], "notes": [ { "category": "description", "text": "A NULL pointer dereference flaw was found in the way the Line 6 POD USB driver in the Linux kernel handled disconnection. This flaw allows an attacker with physical access to the system to crash the system.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: Null pointer dereference in the sound/usb/line6/driver.c", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue is rated as having Low impact because of the physical access needed to trigger this issue.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-15223" }, { "category": "external", "summary": "RHBZ#1749976", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1749976" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-15223", "url": "https://www.cve.org/CVERecord?id=CVE-2019-15223" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-15223", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-15223" } ], "release_date": "2019-08-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-04-28T15:41:38+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:1567" }, { "category": "workaround", "details": "To mitigate this issue, prevent module snd-usb-line6 from being loaded. Please see https://access.redhat.com/solutions/41278 for how to blacklist a kernel module to prevent it from loading automatically.", "product_ids": [ "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "PHYSICAL", "availabilityImpact": "HIGH", "baseScore": 4.6, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "kernel: Null pointer dereference in the sound/usb/line6/driver.c" }, { "cve": "CVE-2019-16234", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "discovery_date": "2019-10-10T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1760441" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Linux kernel. A check was not done on the alloc_workqueue return value of the iwl_trans_pcie_alloc function potentially leading to a NULL pointer dereference. This error condition could lead to a denial of service. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: null pointer dereference in drivers/net/wireless/intel/iwlwifi/pcie/trans.c", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue is rated as having Low impact because of the preconditions needed to trigger the error/resource cleanup code path (system-wide out-of-memory condition, high privileges or physical access). The attacker would have to be able to induce system-wide out-of-memory condition which itself could be seen as a local denial of service. It could be argued that having such privileges has the same impact as the flaw itself.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-16234" }, { "category": "external", "summary": "RHBZ#1760441", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1760441" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-16234", "url": "https://www.cve.org/CVERecord?id=CVE-2019-16234" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-16234", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-16234" }, { "category": "external", "summary": "https://lkml.org/lkml/2019/9/9/487", "url": "https://lkml.org/lkml/2019/9/9/487" } ], "release_date": "2019-09-09T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-04-28T15:41:38+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:1567" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 4.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "kernel: null pointer dereference in drivers/net/wireless/intel/iwlwifi/pcie/trans.c" }, { "cve": "CVE-2019-17053", "cwe": { "id": "CWE-250", "name": "Execution with Unnecessary Privileges" }, "discovery_date": "2019-10-03T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1758242" } ], "notes": [ { "category": "description", "text": "A vulnerability was discovered in the Linux kernel\u0027s AF_IEEE802154 networking module where permissions checks are not enforced. This can allow an unprivileged user to create raw sockets for this protocol leading to the potential for data leaks or system unavailability.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: unprivileged users able to create RAW sockets in AF_IEEE802154 network protocol", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw is rated as moderate; there are no known exploits using this mechanism as an attack surface against the system affected by this bug.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-17053" }, { "category": "external", "summary": "RHBZ#1758242", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1758242" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-17053", "url": "https://www.cve.org/CVERecord?id=CVE-2019-17053" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-17053", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-17053" } ], "release_date": "2019-09-20T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-04-28T15:41:38+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:1567" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 4.0, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L", "version": "3.0" }, "products": [ "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: unprivileged users able to create RAW sockets in AF_IEEE802154 network protocol" }, { "cve": "CVE-2019-17055", "cwe": { "id": "CWE-250", "name": "Execution with Unnecessary Privileges" }, "discovery_date": "2019-10-03T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1758248" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in the Linux kernel\u2019s implementation of the AF_ISDN protocol, which does not enforce the CAP_NET_RAW capability. This flaw can allow unprivileged users to create a raw socket for this protocol. This could further allow the user to control the availability of an existing ISDN circuit.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: unprivileged users able to create RAW sockets in AF_ISDN network protocol", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-17055" }, { "category": "external", "summary": "RHBZ#1758248", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1758248" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-17055", "url": "https://www.cve.org/CVERecord?id=CVE-2019-17055" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-17055", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-17055" } ], "release_date": "2019-09-20T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-04-28T15:41:38+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:1567" }, { "category": "workaround", "details": "At this time the only known way to \u0027mitigate\u0027 this flaw is to blacklist the kernel module from being loaded. Creating raw sockets with this protocol is a method of communicating with ISDN hardware, a technology that is becoming less and less common.\n\nCheck https://access.redhat.com/solutions/41278 for instructions on how to disable the mISDN_core.ko module.", "product_ids": [ "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 4.0, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: unprivileged users able to create RAW sockets in AF_ISDN network protocol" }, { "cve": "CVE-2019-18282", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2020-01-17T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1796360" } ], "notes": [ { "category": "description", "text": "A device tracking vulnerability was found in the flow_dissector feature in the Linux kernel. This flaw occurs because the auto flowlabel of the UDP IPv6 packet relies on a 32-bit hashmd value as a secret, and jhash (instead of siphash) is used. The hashmd value remains the same starting from boot time and can be inferred by an attacker.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: The flow_dissector feature allows device tracking", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-18282" }, { "category": "external", "summary": "RHBZ#1796360", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1796360" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-18282", "url": "https://www.cve.org/CVERecord?id=CVE-2019-18282" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-18282", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-18282" } ], "release_date": "2019-10-22T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-04-28T15:41:38+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:1567" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: The flow_dissector feature allows device tracking" }, { "cve": "CVE-2019-18805", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "discovery_date": "2019-11-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1771496" } ], "notes": [ { "category": "description", "text": "A flaw was reported in the Linux kernel\u0027s TCP subsystem while calculating a packet round trip time, when a sysctl parameter (/proc/sys/net/ipv4/tcp_min_rtt_wlen) is set incorrectly. This causes an integer overflow which can lead to a denial Of service (DOS) attack.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: integer overflow in tcp_ack_update_rtt in net/ipv4/tcp_input.c", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-18805" }, { "category": "external", "summary": "RHBZ#1771496", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1771496" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-18805", "url": "https://www.cve.org/CVERecord?id=CVE-2019-18805" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-18805", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-18805" } ], "release_date": "2019-04-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-04-28T15:41:38+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:1567" }, { "category": "workaround", "details": "This flaw can be mitigated by setting the sysctl parameter (/proc/sys/net/ipv4/tcp_min_rtt_wlen) with 300 which means the packet time will not exceed more then 5 minutes and which should not cause an integer overflow.", "product_ids": [ "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.3, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H", "version": "3.0" }, "products": [ "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: integer overflow in tcp_ack_update_rtt in net/ipv4/tcp_input.c" }, { "cve": "CVE-2019-19045", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-11-18T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1774983" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Linux kernel. The Mellanox Technologies Innova driver mishandles resource cleanup on error. An attacker, able to trigger error could use this flaw to crash the system. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: dos in mlx5_fpga_conn_create_cq() function in drivers/net/ethernet/mellanox/mlx5/core/fpga/conn.c", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue is rated as having Moderate impact because of the privileges needed to trigger the resource cleanup code path.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-19045" }, { "category": "external", "summary": "RHBZ#1774983", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1774983" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-19045", "url": "https://www.cve.org/CVERecord?id=CVE-2019-19045" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-19045", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-19045" } ], "release_date": "2019-11-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-04-28T15:41:38+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:1567" }, { "category": "workaround", "details": "In order to mitigate this issue it is possible to prevent the affected code from being loaded by blacklisting the kernel module mlx5_core. For instructions relating to how to blacklist a kernel module refer to: https://access.redhat.com/solutions/41278 .", "product_ids": [ "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "HIGH", "baseScore": 4.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: dos in mlx5_fpga_conn_create_cq() function in drivers/net/ethernet/mellanox/mlx5/core/fpga/conn.c" }, { "cve": "CVE-2019-19047", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-11-18T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1774991" } ], "notes": [ { "category": "description", "text": "A flaw was found in the way the Mellanox 5th generation network adapters (ConnectX series) core driver in the Linux kernel handled resource cleanup in the mlx5_fw_fatal_reporter_dump function. This flaw allows an attacker with the ability to trigger errors in the mlx5_crdump_collect function to crash the system.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: dos in mlx5_fw_fatal_reporter_dump() function in drivers/net/ethernet/mellanox/mlx5/core/health.c", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue is rated as having Low impact because of the preconditions needed to trigger the resource cleanup code path.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-19047" }, { "category": "external", "summary": "RHBZ#1774991", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1774991" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-19047", "url": "https://www.cve.org/CVERecord?id=CVE-2019-19047" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-19047", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-19047" } ], "release_date": "2019-11-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-04-28T15:41:38+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:1567" }, { "category": "workaround", "details": "In order to mitigate this issue it is possible to prevent the affected code from being loaded by blacklisting the kernel module mlx5_core. For instructions relating to how to blacklist a kernel module refer to: https://access.redhat.com/solutions/41278 .", "product_ids": [ "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "kernel: dos in mlx5_fw_fatal_reporter_dump() function in drivers/net/ethernet/mellanox/mlx5/core/health.c" }, { "cve": "CVE-2019-19055", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-11-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1775074" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Linux kernel. The Wireless configuration API functionality mishandles resource cleanup in nl80211_get_ftm_responder_stats function. An attacker able to trigger the resource cleanup code path could use this flaw to crash the system. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: memory leak in the nl80211_get_ftm_responder_stats() function in net/wireless/nl80211.c allows DoS", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue is rated as having Moderate impact because of the preconditions needed to trigger the resource cleanup code path.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-19055" }, { "category": "external", "summary": "RHBZ#1775074", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1775074" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-19055", "url": "https://www.cve.org/CVERecord?id=CVE-2019-19055" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-19055", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-19055" } ], "release_date": "2019-10-05T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-04-28T15:41:38+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:1567" }, { "category": "workaround", "details": "In order to mitigate this issue it is possible to prevent the affected code from being loaded by blacklisting the kernel module cfg80211. For instructions relating to how to blacklist a kernel module refer to: https://access.redhat.com/solutions/41278 .", "product_ids": [ "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: memory leak in the nl80211_get_ftm_responder_stats() function in net/wireless/nl80211.c allows DoS" }, { "cve": "CVE-2019-19057", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-11-18T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1775050" } ], "notes": [ { "category": "description", "text": "Two memory leak flaws were found in the Linux kernel\u0027s mwifiex_pcie_init_evt_ring() function. A local attacker, able to reload the kernel module or hotplug Marvell WiFi hardware using this driver, can cause a denial of service (memory consumption) by triggering mwifiex_map_pci_memory() failures.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: Two memory leaks in the mwifiex_pcie_init_evt_ring() function in drivers/net/wireless/marvell/mwifiex/pcie.c allows for a DoS", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-19057" }, { "category": "external", "summary": "RHBZ#1775050", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1775050" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-19057", "url": "https://www.cve.org/CVERecord?id=CVE-2019-19057" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-19057", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-19057" } ], "release_date": "2019-11-21T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-04-28T15:41:38+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:1567" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 4.0, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "kernel: Two memory leaks in the mwifiex_pcie_init_evt_ring() function in drivers/net/wireless/marvell/mwifiex/pcie.c allows for a DoS" }, { "cve": "CVE-2019-19058", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-11-18T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1775047" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Linux kernel. The Intel Wireless WiFi MVM Firmware driver mishandles resource cleanup during device coredump. An attacker able to trigger the device coredump and system-wide out of memory conditions at the same time could use this flaw to crash the system. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: A memory leak in the alloc_sgtable() function in drivers/net/wireless/intel/iwlwifi/fw/dbg.c allows for a DoS", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue is rated as having Low impact because of the preconditions needed to trigger the resource cleanup code path (system-wide out-of-memory condition).", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-19058" }, { "category": "external", "summary": "RHBZ#1775047", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1775047" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-19058", "url": "https://www.cve.org/CVERecord?id=CVE-2019-19058" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-19058", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-19058" } ], "release_date": "2019-11-21T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-04-28T15:41:38+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:1567" }, { "category": "workaround", "details": "In order to mitigate this issue it is possible to prevent the affected code from being loaded by blacklisting the kernel module iwlmvm. For instructions relating to how to blacklist a kernel module refer to: https://access.redhat.com/solutions/41278 .", "product_ids": [ "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 4.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "kernel: A memory leak in the alloc_sgtable() function in drivers/net/wireless/intel/iwlwifi/fw/dbg.c allows for a DoS" }, { "cve": "CVE-2019-19059", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-11-18T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1775042" } ], "notes": [ { "category": "description", "text": "A flaw was found in the way the Intel Wireless driver in the Linux kernel handled resource cleanup during Gen 3 device initialization. This flaw allows an attacker with the ability to restrict access to DMA coherent memory on device initialization, to crash the system.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: Multiple memory leaks in the iwl_pcie_ctxt_info_gen3_init() function in drivers/net/wireless/intel/iwlwifi/pcie/ctxt-info-gen3.c allows for a DoS", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue is rated as having Low impact because of the preconditions needed to trigger the resource cleanup code path (ability to restrict access to dma coherent memory on device initialization).", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-19059" }, { "category": "external", "summary": "RHBZ#1775042", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1775042" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-19059", "url": "https://www.cve.org/CVERecord?id=CVE-2019-19059" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-19059", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-19059" } ], "release_date": "2019-11-21T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-04-28T15:41:38+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:1567" }, { "category": "workaround", "details": "In order to mitigate this issue it is possible to prevent the affected code from being loaded by blacklisting the kernel module iwlwifi. For instructions relating to how to blacklist a kernel module refer to: https://access.redhat.com/solutions/41278 .", "product_ids": [ "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 4.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "kernel: Multiple memory leaks in the iwl_pcie_ctxt_info_gen3_init() function in drivers/net/wireless/intel/iwlwifi/pcie/ctxt-info-gen3.c allows for a DoS" }, { "cve": "CVE-2019-19065", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-11-18T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1775000" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Linux kernel. The Intel OPA Gen1 driver mishandles resource cleanup. An attacker able to induce low memory condition on the system could use this flaw to crash the system. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: A memory leak in the sdma_init() function in drivers/infiniband/hw/hfi1/sdma.c allows for a DoS", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue is rated as having Low impact because of the preconditions needed to trigger the resource cleanup code path (system-wide out-of-memory condition).", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-19065" }, { "category": "external", "summary": "RHBZ#1775000", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1775000" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-19065", "url": "https://www.cve.org/CVERecord?id=CVE-2019-19065" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-19065", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-19065" } ], "release_date": "2019-11-21T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-04-28T15:41:38+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:1567" }, { "category": "workaround", "details": "In order to mitigate this issue it is possible to prevent the affected code from being loaded by blacklisting the kernel module hfi1. For instructions relating to how to blacklist a kernel module refer to: https://access.redhat.com/solutions/41278 .", "product_ids": [ "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 4.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "kernel: A memory leak in the sdma_init() function in drivers/infiniband/hw/hfi1/sdma.c allows for a DoS" }, { "cve": "CVE-2019-19067", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-11-18T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1774968" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Linux kernel. The acp_hw_init function fails to cleanup resources properly. A local attacker can induce an error condition to crash the system. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: Four memory leaks in the acp_hw_init() function in drivers/gpu/drm/amd/amdgpu/amdgpu_acp.c allow for a DoS", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue is rated as having Low impact because of the preconditions needed to trigger the error/resource cleanup code path.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-19067" }, { "category": "external", "summary": "RHBZ#1774968", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1774968" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-19067", "url": "https://www.cve.org/CVERecord?id=CVE-2019-19067" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-19067", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-19067" } ], "release_date": "2019-11-21T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-04-28T15:41:38+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:1567" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 4.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "kernel: Four memory leaks in the acp_hw_init() function in drivers/gpu/drm/amd/amdgpu/amdgpu_acp.c allow for a DoS" }, { "cve": "CVE-2019-19073", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-11-18T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1774937" } ], "notes": [ { "category": "description", "text": "Memory leaks in drivers/net/wireless/ath/ath9k/htc_hst.c in the Linux kernel through 5.3.11 allow attackers to cause a denial of service (memory consumption) by triggering wait_for_completion_timeout() failures. This affects the htc_config_pipe_credits() function, the htc_setup_complete() function, and the htc_connect_service() function, aka CID-853acf7caf10.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: Memory leaks in drivers/net/wireless/ath/ath9k/htc_hst.c in the Linux kernel (DOS)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-19073" }, { "category": "external", "summary": "RHBZ#1774937", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1774937" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-19073", "url": "https://www.cve.org/CVERecord?id=CVE-2019-19073" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-19073", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-19073" } ], "release_date": "2019-11-21T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-04-28T15:41:38+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:1567" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 4.0, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "kernel: Memory leaks in drivers/net/wireless/ath/ath9k/htc_hst.c in the Linux kernel (DOS)" }, { "cve": "CVE-2019-19074", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "discovery_date": "2019-11-18T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1774933" } ], "notes": [ { "category": "description", "text": "A memory leak in the ath9k_wmi_cmd() function in drivers/net/wireless/ath/ath9k/wmi.c in the Linux kernel through 5.3.11 allows attackers to cause a denial of service (memory consumption), aka CID-728c1e2a05e4.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: a memory leak in the ath9k management function in allows local DoS", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-19074" }, { "category": "external", "summary": "RHBZ#1774933", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1774933" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-19074", "url": "https://www.cve.org/CVERecord?id=CVE-2019-19074" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-19074", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-19074" } ], "release_date": "2019-11-21T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-04-28T15:41:38+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:1567" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "kernel: a memory leak in the ath9k management function in allows local DoS" }, { "cve": "CVE-2019-19077", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-11-22T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1775724" } ], "notes": [ { "category": "description", "text": "A memory leak flaw was found in the Broadcom NetXtreme HCA driver in the Linux kernel, in the way it handled resource cleanup on the copy to userspace error. This flaw allows a local attacker to trigger this error and crash the system.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: memory leak in bnxt_re_create_srq function in drivers/infiniband/hw/bnxt_re/ib_verbs.c", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue is rated as having Moderate impact because local attacker is needed in order to trigger it.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-19077" }, { "category": "external", "summary": "RHBZ#1775724", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1775724" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-19077", "url": "https://www.cve.org/CVERecord?id=CVE-2019-19077" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-19077", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-19077" } ], "release_date": "2019-09-10T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-04-28T15:41:38+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:1567" }, { "category": "workaround", "details": "In order to mitigate this issue it is possible to prevent the affected code from being loaded by blacklisting the kernel module bnxt_re. For instructions relating to how to blacklist a kernel module refer to: https://access.redhat.com/solutions/41278 .", "product_ids": [ "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: memory leak in bnxt_re_create_srq function in drivers/infiniband/hw/bnxt_re/ib_verbs.c" }, { "cve": "CVE-2019-19532", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "discovery_date": "2019-12-10T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1781821" } ], "notes": [ { "category": "description", "text": "An out-of-bounds write flaw was found in the Linux kernel\u2019s HID drivers. An attacker, able to plug in a malicious USB device, can crash the system or read and write to memory with an incorrect address.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: malicious USB devices can lead to multiple out-of-bounds write", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue was rated as having Moderate impact because of the need of physical access to trigger it.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-19532" }, { "category": "external", "summary": "RHBZ#1781821", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1781821" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-19532", "url": "https://www.cve.org/CVERecord?id=CVE-2019-19532" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-19532", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-19532" } ], "release_date": "2019-12-03T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-04-28T15:41:38+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:1567" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "PHYSICAL", "availabilityImpact": "HIGH", "baseScore": 6.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: malicious USB devices can lead to multiple out-of-bounds write" }, { "cve": "CVE-2019-19534", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2019-12-04T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1783540" } ], "notes": [ { "category": "description", "text": "An information-leak flaw was found in the Linux kernel\u0027s pcan USB driver. When a device using this driver connects to the system, the stack information is leaked to the CAN bus, a controller area network for automobiles. The highest threat with this vulnerability is breach of data confidentiality.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: information leak bug caused by a malicious USB device in the drivers/net/can/usb/peak_usb/pcan_usb_core.c driver", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-19534" }, { "category": "external", "summary": "RHBZ#1783540", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1783540" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-19534", "url": "https://www.cve.org/CVERecord?id=CVE-2019-19534" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-19534", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-19534" } ], "release_date": "2019-11-04T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-04-28T15:41:38+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:1567" }, { "category": "workaround", "details": "As the devices module will be auto-loaded when the USB CAN bus adapter is connected, its can be disabled by preventing the module from loading with the following instructions:\n\n# echo \"install peak_usb /bin/true\" \u003e\u003e /etc/modprobe.d/disable-peak-usb-canbus.conf \n \nThe system will need to be restarted if the peak_usb module is already loaded. In most circumstances, the kernel modules will be unable to be unloaded while any CAN bus interfaces are active and the protocol is in use. If the system requires this module to work correctly, this mitigation may not be suitable. If you need further assistance, see KCS article https://access.redhat.com/solutions/41278 or contact Red Hat Global Support Services.", "product_ids": [ "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "PHYSICAL", "availabilityImpact": "NONE", "baseScore": 4.6, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: information leak bug caused by a malicious USB device in the drivers/net/can/usb/peak_usb/pcan_usb_core.c driver" }, { "cve": "CVE-2019-19768", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2019-12-23T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1786164" } ], "notes": [ { "category": "description", "text": "A use-after-free vulnerability was found in the Linux kernel\u2019s implementation of blktrace in the __blk_add_trace function. A local attacker with permissions to run block trace instructions against a device can create a situation where the core block_trace object is used after it is freed. The attacker can pre-groom memory to race this use-after-free to create a condition where the memory is corrupted and cause privilege escalation.\r\n\r\nThe ability to create this condition requires elevated privileges, and it has been decided that this change in Red Hat Enterprise Linux 5 and 6 would risk introducing possible regressions and will not be backported.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: use-after-free in __blk_add_trace in kernel/trace/blktrace.c", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-19768" }, { "category": "external", "summary": "RHBZ#1786164", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1786164" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-19768", "url": "https://www.cve.org/CVERecord?id=CVE-2019-19768" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-19768", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-19768" } ], "release_date": "2019-11-29T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-04-28T15:41:38+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:1567" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: use-after-free in __blk_add_trace in kernel/trace/blktrace.c" }, { "cve": "CVE-2019-19922", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2020-01-17T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1792512" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Linux kernel\u2019s scheduler, where it can allow attackers to cause a denial of service against non-CPU-bound applications by generating a workload that triggers unwanted scheduling slice expiration. A local attacker who can trigger a specific workload type could abuse this technique to trigger a system to be seen as degraded, and possibly trigger workload-rebalance in systems that use the slice-expiration metric as a measure of system health.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: when cpu.cfs_quota_us is used allows attackers to cause a denial of service against non-cpu-bound applications", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-19922" }, { "category": "external", "summary": "RHBZ#1792512", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1792512" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-19922", "url": "https://www.cve.org/CVERecord?id=CVE-2019-19922" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-19922", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-19922" } ], "release_date": "2019-12-22T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-04-28T15:41:38+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:1567" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "kernel: when cpu.cfs_quota_us is used allows attackers to cause a denial of service against non-cpu-bound applications" }, { "acknowledgments": [ { "names": [ "Xiumei Mu" ], "organization": "Red Hat QE Engineering", "summary": "This issue was discovered by Red Hat." } ], "cve": "CVE-2020-1749", "cwe": { "id": "CWE-319", "name": "Cleartext Transmission of Sensitive Information" }, "discovery_date": "2020-03-04T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1809833" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Linux kernel\u0027s implementation of some networking protocols in IPsec, such as VXLAN and GENEVE tunnels over IPv6. When an encrypted tunnel is created between two hosts, the kernel isn\u0027t correctly routing tunneled data over the encrypted link; rather sending the data unencrypted. This would allow anyone in between the two endpoints to read the traffic unencrypted. The main threat from this vulnerability is to data confidentiality.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: some ipv6 protocols not encrypted over ipsec tunnel", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-1749" }, { "category": "external", "summary": "RHBZ#1809833", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1809833" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-1749", "url": "https://www.cve.org/CVERecord?id=CVE-2020-1749" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-1749", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-1749" } ], "release_date": "2020-03-04T01:29:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-04-28T15:41:38+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:1567" }, { "category": "workaround", "details": "Disabling the IPV6 protocol may be a suitable workaround for systems that do not require the protocol to function correctly, however, if IPV6 is not in use this flaw will not be triggered.", "product_ids": [ "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: some ipv6 protocols not encrypted over ipsec tunnel" }, { "cve": "CVE-2020-7053", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2020-01-28T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1795624" } ], "notes": [ { "category": "description", "text": "A use-after-free flaw was found in the Linux kernel\u2019s GPU driver functionality when destroying GEM context. A local user could use this flaw to crash the system or potentially escalate their privileges.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: use-after-free in i915_ppgtt_close in drivers/gpu/drm/i915/i915_gem_gtt.c", "title": "Vulnerability summary" }, { "category": "other", "text": "The impact of this issue is Moderate, because attack is specific for certain Intel hardware and could be triggered only by local user with write access to the device.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-7053" }, { "category": "external", "summary": "RHBZ#1795624", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1795624" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-7053", "url": "https://www.cve.org/CVERecord?id=CVE-2020-7053" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-7053", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-7053" } ], "release_date": "2020-01-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-04-28T15:41:38+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:1567" }, { "category": "workaround", "details": "In case of dedicated graphic card presence and i915 GPU is not being used, you can prevent module i915 from being loaded. Please see https://access.redhat.com/solutions/41278 for how to blacklist a kernel module to prevent it from loading automatically.", "product_ids": [ "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: use-after-free in i915_ppgtt_close in drivers/gpu/drm/i915/i915_gem_gtt.c" }, { "cve": "CVE-2020-10690", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2019-11-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1817141" } ], "notes": [ { "category": "description", "text": "There is a use-after-free problem seen due to a race condition between the release of ptp_clock and cdev while resource deallocation. When a (high privileged) process allocates a ptp device file (like /dev/ptpX) and voluntarily goes to sleep. During this time if the underlying device is removed, it can cause an exploitable condition as the process wakes up to terminate and clean all attached files. The system crashes due to the cdev structure being invalid (as already freed) which is pointed to by the inode.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: use-after-free in cdev_put() when a PTP device is removed while it\u0027s chardev is open", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue is rated as having Low impact as there is a need for high privilege access to trigger this problem. This will need an access to /dev/ptpX which is privileged operation, also removing the module is needed (again, privileged operation).", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-10690" }, { "category": "external", "summary": "RHBZ#1817141", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1817141" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-10690", "url": "https://www.cve.org/CVERecord?id=CVE-2020-10690" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-10690", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-10690" } ], "release_date": "2019-11-25T12:53:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-04-28T15:41:38+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:1567" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "kernel: use-after-free in cdev_put() when a PTP device is removed while it\u0027s chardev is open" }, { "cve": "CVE-2021-33630", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "discovery_date": "2024-01-30T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2261974" } ], "notes": [ { "category": "description", "text": "A NULL pointer dereference flaw was found in the Linux kernel\u0027s network scheduler. This issue occurs when offloading is enabled, the cbs instance is not added to the list. The code also incorrectly handles the case when offload is disabled without removing the qdisc. This could allow a local user to cause a denial of service condition.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: net/sched: cbs NULL pointer dereference when offloading is enabled", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-33630" }, { "category": "external", "summary": "RHBZ#2261974", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2261974" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-33630", "url": "https://www.cve.org/CVERecord?id=CVE-2021-33630" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-33630", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-33630" }, { "category": "external", "summary": "https://seclists.org/oss-sec/2024/q1/65", "url": "https://seclists.org/oss-sec/2024/q1/65" } ], "release_date": "2024-01-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-04-28T15:41:38+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:1567" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: net/sched: cbs NULL pointer dereference when offloading is enabled" } ] }
RHSA-2020:1567
Vulnerability from csaf_redhat
Published
2020-04-28 15:41
Modified
2025-03-17 02:33
Summary
Red Hat Security Advisory: kernel-rt security, bug fix, and enhancement update
Notes
Topic
An update for kernel-rt is now available for Red Hat Enterprise Linux 8.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements.
Security Fix(es):
* kernel: use-after-free in __blk_add_trace in kernel/trace/blktrace.c (CVE-2019-19768)
* kernel: nfs: NULL pointer dereference due to an anomalized NFS message sequence (CVE-2018-16871)
* kernel: memory leak in the kernel_read_file function in fs/exec.c allows to cause a denial of service (CVE-2019-8980)
* kernel: unprivileged users able to create RAW sockets in AF_IEEE802154 network protocol. (CVE-2019-17053)
* kernel: unprivileged users able to create RAW sockets in AF_ISDN network protocol. (CVE-2019-17055)
* kernel: integer overflow in tcp_ack_update_rtt in net/ipv4/tcp_input.c (CVE-2019-18805)
* kernel: information leak bug caused by a malicious USB device in the drivers/net/can/usb/peak_usb/pcan_usb_core.c driver (CVE-2019-19534)
* kernel: some ipv6 protocols not encrypted over ipsec tunnel. (CVE-2020-1749)
* Kernel: net: using kernel space address bits to derive IP ID may potentially break KASLR (CVE-2019-10639)
* kernel: An out-of-bounds read in drivers/scsi/qedi/qedi_dbg.c leading to crash or information disclosure (CVE-2019-15090)
* kernel: a NULL pointer dereference in drivers/net/wireless/ath/ath10k/usb.c leads to a crash (CVE-2019-15099)
* kernel: Null pointer dereference in the sound/usb/line6/pcm.c (CVE-2019-15221)
* kernel: Two memory leaks in the mwifiex_pcie_init_evt_ring() function in drivers/net/wireless/marvell/mwifiex/pcie.c allows for a DoS (CVE-2019-19057)
* kernel: Memory leaks in drivers/net/wireless/ath/ath9k/htc_hst.c in the Linux kernel (DOS) (CVE-2019-19073)
* kernel: a memory leak in the ath9k management function in allows local DoS (CVE-2019-19074)
* kernel: when cpu.cfs_quota_us is used allows attackers to cause a denial of service against non-cpu-bound applications (CVE-2019-19922)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
* RT: update RT source tree to the RHEL-8.2 tree (BZ#1708716)
* KVM-RT guest fails boot with emulatorsched (BZ#1712781)
* 8 vCPU guest need max latency < 20 us with stress [RT-8.2] (BZ#1757165)
* Request nx_huge_pages=N as default value to avoid kvm-rt guest large latency spike [rt-8] (BZ#1788352)
* RT: Add rpm Provide of 'kernel' to indicate that this is a kernel package (BZ#1796284)
* [RHEL8] RT kernel signed by test certificate and not Red Hat Secure Boot (BZ#1806871)
Enhancement(s):
* update to the upstream 5.x RT patchset (BZ#1680161)
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for kernel-rt is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements.\n\nSecurity Fix(es):\n\n* kernel: use-after-free in __blk_add_trace in kernel/trace/blktrace.c (CVE-2019-19768)\n\n* kernel: nfs: NULL pointer dereference due to an anomalized NFS message sequence (CVE-2018-16871)\n\n* kernel: memory leak in the kernel_read_file function in fs/exec.c allows to cause a denial of service (CVE-2019-8980)\n\n* kernel: unprivileged users able to create RAW sockets in AF_IEEE802154 network protocol. (CVE-2019-17053)\n\n* kernel: unprivileged users able to create RAW sockets in AF_ISDN network protocol. (CVE-2019-17055)\n\n* kernel: integer overflow in tcp_ack_update_rtt in net/ipv4/tcp_input.c (CVE-2019-18805)\n\n* kernel: information leak bug caused by a malicious USB device in the drivers/net/can/usb/peak_usb/pcan_usb_core.c driver (CVE-2019-19534)\n\n* kernel: some ipv6 protocols not encrypted over ipsec tunnel. (CVE-2020-1749)\n\n* Kernel: net: using kernel space address bits to derive IP ID may potentially break KASLR (CVE-2019-10639)\n\n* kernel: An out-of-bounds read in drivers/scsi/qedi/qedi_dbg.c leading to crash or information disclosure (CVE-2019-15090)\n\n* kernel: a NULL pointer dereference in drivers/net/wireless/ath/ath10k/usb.c leads to a crash (CVE-2019-15099)\n\n* kernel: Null pointer dereference in the sound/usb/line6/pcm.c (CVE-2019-15221)\n\n* kernel: Two memory leaks in the mwifiex_pcie_init_evt_ring() function in drivers/net/wireless/marvell/mwifiex/pcie.c allows for a DoS (CVE-2019-19057)\n\n* kernel: Memory leaks in drivers/net/wireless/ath/ath9k/htc_hst.c in the Linux kernel (DOS) (CVE-2019-19073)\n\n* kernel: a memory leak in the ath9k management function in allows local DoS (CVE-2019-19074)\n\n* kernel: when cpu.cfs_quota_us is used allows attackers to cause a denial of service against non-cpu-bound applications (CVE-2019-19922)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nBug Fix(es):\n\n* RT: update RT source tree to the RHEL-8.2 tree (BZ#1708716)\n\n* KVM-RT guest fails boot with emulatorsched (BZ#1712781)\n\n* 8 vCPU guest need max latency \u003c 20 us with stress [RT-8.2] (BZ#1757165)\n\n* Request nx_huge_pages=N as default value to avoid kvm-rt guest large latency spike [rt-8] (BZ#1788352)\n\n* RT: Add rpm Provide of \u0027kernel\u0027 to indicate that this is a kernel package (BZ#1796284)\n\n* [RHEL8] RT kernel signed by test certificate and not Red Hat Secure Boot (BZ#1806871)\n\nEnhancement(s):\n\n* update to the upstream 5.x RT patchset (BZ#1680161)", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2020:1567", "url": "https://access.redhat.com/errata/RHSA-2020:1567" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/8/html/8.2_release_notes/index", "url": "https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/8/html/8.2_release_notes/index" }, { "category": "external", "summary": "1655162", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1655162" }, { "category": "external", "summary": "1679972", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1679972" }, { "category": "external", "summary": "1708716", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1708716" }, { "category": "external", "summary": "1712781", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1712781" }, { "category": "external", "summary": "1729933", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1729933" }, { "category": "external", "summary": "1743526", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1743526" }, { "category": "external", "summary": "1743560", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1743560" }, { "category": "external", "summary": "1749974", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1749974" }, { "category": "external", "summary": "1757165", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1757165" }, { "category": "external", "summary": "1758242", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1758242" }, { "category": "external", "summary": "1758248", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1758248" }, { "category": "external", "summary": "1768730", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1768730" }, { "category": "external", "summary": "1771496", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1771496" }, { "category": "external", "summary": "1772738", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1772738" }, { "category": "external", "summary": "1774933", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1774933" }, { "category": "external", "summary": "1774937", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1774937" }, { "category": "external", "summary": "1775050", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1775050" }, { "category": "external", "summary": "1783540", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1783540" }, { "category": "external", "summary": "1786164", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1786164" }, { "category": "external", "summary": "1788352", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1788352" }, { "category": "external", "summary": "1792512", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1792512" }, { "category": "external", "summary": "1796284", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1796284" }, { "category": "external", "summary": "1806871", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1806871" }, { "category": "external", "summary": "1809833", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1809833" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2020/rhsa-2020_1567.json" } ], "title": "Red Hat Security Advisory: kernel-rt security, bug fix, and enhancement update", "tracking": { "current_release_date": "2025-03-17T02:33:57+00:00", "generator": { "date": "2025-03-17T02:33:57+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.4.1" } }, "id": "RHSA-2020:1567", "initial_release_date": "2020-04-28T15:41:38+00:00", "revision_history": [ { "date": "2020-04-28T15:41:38+00:00", "number": "1", "summary": "Initial version" }, { "date": "2020-04-28T15:41:38+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-03-17T02:33:57+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux Real Time for NFV (v. 8)", "product": { "name": "Red Hat Enterprise Linux Real Time for NFV (v. 8)", "product_id": "NFV-8.2.0.GA", "product_identification_helper": { "cpe": "cpe:/a:redhat:enterprise_linux:8::nfv" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Real Time (v. 8)", "product": { "name": "Red Hat Enterprise Linux Real Time (v. 8)", "product_id": "RT-8.2.0.GA", "product_identification_helper": { "cpe": "cpe:/a:redhat:enterprise_linux:8::realtime" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "product": { "name": "kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "product_id": "kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt@4.18.0-193.rt13.51.el8?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "product": { "name": "kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "product_id": "kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-core@4.18.0-193.rt13.51.el8?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "product": { "name": "kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "product_id": "kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debug@4.18.0-193.rt13.51.el8?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "product": { "name": "kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "product_id": "kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debug-core@4.18.0-193.rt13.51.el8?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "product": { "name": "kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "product_id": "kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debug-devel@4.18.0-193.rt13.51.el8?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "product": { "name": "kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "product_id": "kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debug-modules@4.18.0-193.rt13.51.el8?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "product": { "name": "kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "product_id": "kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debug-modules-extra@4.18.0-193.rt13.51.el8?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "product": { "name": "kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "product_id": "kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-devel@4.18.0-193.rt13.51.el8?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "product": { "name": "kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "product_id": "kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-modules@4.18.0-193.rt13.51.el8?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "product": { "name": "kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "product_id": "kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-modules-extra@4.18.0-193.rt13.51.el8?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "product": { "name": "kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "product_id": "kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debug-debuginfo@4.18.0-193.rt13.51.el8?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "product": { "name": "kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "product_id": "kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debuginfo@4.18.0-193.rt13.51.el8?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "product": { "name": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "product_id": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debuginfo-common-x86_64@4.18.0-193.rt13.51.el8?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "product": { "name": "kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "product_id": "kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debug-kvm@4.18.0-193.rt13.51.el8?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "product": { "name": "kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "product_id": "kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-kvm@4.18.0-193.rt13.51.el8?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "kernel-rt-0:4.18.0-193.rt13.51.el8.src", "product": { "name": "kernel-rt-0:4.18.0-193.rt13.51.el8.src", "product_id": "kernel-rt-0:4.18.0-193.rt13.51.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt@4.18.0-193.rt13.51.el8?arch=src" } } } ], "category": "architecture", "name": "src" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-0:4.18.0-193.rt13.51.el8.src as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)", "product_id": "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src" }, "product_reference": "kernel-rt-0:4.18.0-193.rt13.51.el8.src", "relates_to_product_reference": "NFV-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)", "product_id": "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64" }, "product_reference": "kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "relates_to_product_reference": "NFV-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)", "product_id": "NFV-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64" }, "product_reference": "kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "relates_to_product_reference": "NFV-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)", "product_id": "NFV-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64" }, "product_reference": "kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "relates_to_product_reference": "NFV-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)", "product_id": "NFV-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64" }, "product_reference": "kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "relates_to_product_reference": "NFV-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)", "product_id": "NFV-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64" }, "product_reference": "kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "relates_to_product_reference": "NFV-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)", "product_id": "NFV-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64" }, "product_reference": "kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "relates_to_product_reference": "NFV-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)", "product_id": "NFV-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64" }, "product_reference": "kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "relates_to_product_reference": "NFV-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)", "product_id": "NFV-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64" }, "product_reference": "kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "relates_to_product_reference": "NFV-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)", "product_id": "NFV-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64" }, "product_reference": "kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "relates_to_product_reference": "NFV-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)", "product_id": "NFV-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64" }, "product_reference": "kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "relates_to_product_reference": "NFV-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)", "product_id": "NFV-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64" }, "product_reference": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "relates_to_product_reference": "NFV-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)", "product_id": "NFV-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64" }, "product_reference": "kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "relates_to_product_reference": "NFV-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)", "product_id": "NFV-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64" }, "product_reference": "kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "relates_to_product_reference": "NFV-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)", "product_id": "NFV-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64" }, "product_reference": "kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "relates_to_product_reference": "NFV-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)", "product_id": "NFV-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64" }, "product_reference": "kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "relates_to_product_reference": "NFV-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-0:4.18.0-193.rt13.51.el8.src as a component of Red Hat Enterprise Linux Real Time (v. 8)", "product_id": "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src" }, "product_reference": "kernel-rt-0:4.18.0-193.rt13.51.el8.src", "relates_to_product_reference": "RT-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)", "product_id": "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64" }, "product_reference": "kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "relates_to_product_reference": "RT-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)", "product_id": "RT-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64" }, "product_reference": "kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "relates_to_product_reference": "RT-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)", "product_id": "RT-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64" }, "product_reference": "kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "relates_to_product_reference": "RT-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)", "product_id": "RT-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64" }, "product_reference": "kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "relates_to_product_reference": "RT-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)", "product_id": "RT-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64" }, "product_reference": "kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "relates_to_product_reference": "RT-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)", "product_id": "RT-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64" }, "product_reference": "kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "relates_to_product_reference": "RT-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)", "product_id": "RT-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64" }, "product_reference": "kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "relates_to_product_reference": "RT-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)", "product_id": "RT-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64" }, "product_reference": "kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "relates_to_product_reference": "RT-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)", "product_id": "RT-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64" }, "product_reference": "kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "relates_to_product_reference": "RT-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)", "product_id": "RT-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64" }, "product_reference": "kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "relates_to_product_reference": "RT-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)", "product_id": "RT-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64" }, "product_reference": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "relates_to_product_reference": "RT-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)", "product_id": "RT-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64" }, "product_reference": "kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "relates_to_product_reference": "RT-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)", "product_id": "RT-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64" }, "product_reference": "kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "relates_to_product_reference": "RT-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)", "product_id": "RT-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64" }, "product_reference": "kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "relates_to_product_reference": "RT-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)", "product_id": "RT-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64" }, "product_reference": "kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "relates_to_product_reference": "RT-8.2.0.GA" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "Hangbin Liu" ], "organization": "Red Hat", "summary": "This issue was discovered by Red Hat." }, { "names": [ "Jasu Liedes" ], "organization": "Synopsys SIG" } ], "cve": "CVE-2018-16871", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "discovery_date": "2018-11-21T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1655162" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Linux kernel\u0027s NFS implementation. An attacker, who is able to mount an exported NFS filesystem, is able to trigger a null pointer dereference by using an invalid NFS sequence. This can panic the machine and deny access to the NFS server. Any outstanding disk writes to the NFS server will be lost.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: nfs: NULL pointer dereference due to an anomalized NFS message sequence", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-16871" }, { "category": "external", "summary": "RHBZ#1655162", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1655162" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-16871", "url": "https://www.cve.org/CVERecord?id=CVE-2018-16871" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-16871", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-16871" } ], "release_date": "2019-06-03T02:23:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-04-28T15:41:38+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:1567" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: nfs: NULL pointer dereference due to an anomalized NFS message sequence" }, { "cve": "CVE-2019-5108", "cwe": { "id": "CWE-440", "name": "Expected Behavior Violation" }, "discovery_date": "2020-01-10T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1789927" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Linux kernel\u2019s implementation of the WiFi station handoff code. An attacker within the radio range could use this flaw to deny a valid device from joining the access point.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: triggering AP to send IAPP location updates for stations before the required authentication process has completed can lead to DoS", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-5108" }, { "category": "external", "summary": "RHBZ#1789927", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1789927" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-5108", "url": "https://www.cve.org/CVERecord?id=CVE-2019-5108" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-5108", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-5108" } ], "release_date": "2019-12-11T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-04-28T15:41:38+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:1567" }, { "category": "workaround", "details": "At this time there is no known mitigations to this issue other than to install the updated kernel package.", "product_ids": [ "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: triggering AP to send IAPP location updates for stations before the required authentication process has completed can lead to DoS" }, { "cve": "CVE-2019-8980", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-02-21T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1679972" } ], "notes": [ { "category": "description", "text": "A kernel memory leak was found in the kernel_read_file() function in the fs/exec.c file in the Linux kernel. An attacker could use this flaw to cause a memory leak and thus a denial of service (DoS).", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: memory leak in the kernel_read_file function in fs/exec.c allows to cause a denial of service", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-8980" }, { "category": "external", "summary": "RHBZ#1679972", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1679972" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-8980", "url": "https://www.cve.org/CVERecord?id=CVE-2019-8980" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-8980", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-8980" } ], "release_date": "2019-02-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-04-28T15:41:38+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:1567" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: memory leak in the kernel_read_file function in fs/exec.c allows to cause a denial of service" }, { "cve": "CVE-2019-10639", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2019-07-06T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1729933" } ], "notes": [ { "category": "description", "text": "A flaw was found in the way the Linux kernel derived the IP ID field from a partial kernel space address returned by a net_hash_mix() function. A remote user could observe this IP ID field to extract the kernel\u00a0address bits used to derive its value, which may result in leaking the hash key and potentially defeating KASLR.", "title": "Vulnerability description" }, { "category": "summary", "text": "Kernel: net: using kernel space address bits to derive IP ID may potentially break KASLR", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue does not affect the versions of Linux kernel as shipped with Red Hat Enterprise Linux 5 and Red Hat Enterprise Linux 6.\n\nThis issue affects the version of Linux kernel as shipped with Red Hat Enterprise Linux 7, 8 and Red Hat Enterprise MRG 2. Future kernel updates for Red Hat Enterprise Linux 7, 8 and Red Hat Enterprise MRG 2 may address this issue.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-10639" }, { "category": "external", "summary": "RHBZ#1729933", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1729933" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-10639", "url": "https://www.cve.org/CVERecord?id=CVE-2019-10639" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-10639", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-10639" }, { "category": "external", "summary": "https://arxiv.org/pdf/1906.10478.pdf", "url": "https://arxiv.org/pdf/1906.10478.pdf" } ], "release_date": "2019-07-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-04-28T15:41:38+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:1567" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 3.7, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" }, "products": [ "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "Kernel: net: using kernel space address bits to derive IP ID may potentially break KASLR" }, { "cve": "CVE-2019-12819", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2019-06-14T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1721962" } ], "notes": [ { "category": "description", "text": "A use-after-free flaw was found in the Linux kernel\u0027s MDIO section of the network management subsystem. An attacker who is able to hot-plug a network device can trigger the __mdiobus_register() function in drivers/net/phy/mdio_bus.c, which can cause a use-after-free condition causing a memory corruption and kernel panic or privilege escalation.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: use-after-free in function __mdiobus_register() in drivers/net/phy/mdio_bus.c", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-12819" }, { "category": "external", "summary": "RHBZ#1721962", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1721962" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-12819", "url": "https://www.cve.org/CVERecord?id=CVE-2019-12819" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-12819", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-12819" } ], "release_date": "2019-06-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-04-28T15:41:38+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:1567" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 4.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N", "version": "3.0" }, "products": [ "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: use-after-free in function __mdiobus_register() in drivers/net/phy/mdio_bus.c" }, { "cve": "CVE-2019-15090", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "discovery_date": "2019-08-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1743526" } ], "notes": [ { "category": "description", "text": "An out-of-bounds (OOB) memory access flaw was found in the Qlogic ISCSI module in the Linux kernel\u0027s qedi_dbg_* family of functions in drivers/scsi/qedi/qedi_dbg.c. Here a local attacker with a special user privilege account (or a root) can cause an out-of-bound memory access leading to a system crash or a leak of internal kernel information.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: An out-of-bounds read in drivers/scsi/qedi/qedi_dbg.c leading to crash or information disclosure", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-15090" }, { "category": "external", "summary": "RHBZ#1743526", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1743526" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-15090", "url": "https://www.cve.org/CVERecord?id=CVE-2019-15090" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-15090", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-15090" } ], "release_date": "2019-08-20T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-04-28T15:41:38+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:1567" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "kernel: An out-of-bounds read in drivers/scsi/qedi/qedi_dbg.c leading to crash or information disclosure" }, { "cve": "CVE-2019-15099", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2019-08-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1743560" } ], "notes": [ { "category": "description", "text": "A null pointer dereference flaw was discovered in the Linux kernel\u0027s implementation of the ath10k USB device driver. The vulnerability requires the attacker to plug in a specially crafted hardware device that present endpoint descriptors that normal ath10k devices do not recognize. System availability is the highest threat with this vulnerability.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: a NULL pointer dereference in drivers/net/wireless/ath/ath10k/usb.c leads to a crash", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-15099" }, { "category": "external", "summary": "RHBZ#1743560", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1743560" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-15099", "url": "https://www.cve.org/CVERecord?id=CVE-2019-15099" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-15099", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-15099" } ], "release_date": "2019-08-20T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-04-28T15:41:38+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:1567" }, { "category": "workaround", "details": "As the ath10k module will be auto-loaded when required, its use can be disabled by preventing the module from loading using the following instructions.\n\nOn the command line, as root, execute the following command:\n# echo \"install ath10k_usb /bin/true\" \u003e\u003e /etc/modprobe.d/disable-ath10k_usb.conf \n \nThe system will need to be restarted if the ath10k_usb module are loaded. In most circumstances, the kernel modules will be unable to be unloaded while the ath10k WiFi network interface is in use. If the system requires this module to work correctly, this mitigation may not be suitable.\n\nIf you need further assistance, see KCS article https://access.redhat.com/solutions/41278 or contact Red Hat Global Support Services.", "product_ids": [ "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "PHYSICAL", "availabilityImpact": "HIGH", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "kernel: a NULL pointer dereference in drivers/net/wireless/ath/ath10k/usb.c leads to a crash" }, { "cve": "CVE-2019-15221", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "discovery_date": "2019-08-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1749974" } ], "notes": [ { "category": "description", "text": "A NULL pointer dereference flaw was found in the way the LINE6 drivers in the Linux kernel allocated buffers for USB packets. This flaw allows an attacker with physical access to the system to crash the system.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: Null pointer dereference in the sound/usb/line6/pcm.c", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue is rated as having Low impact because of the physical access needed to trigger this issue.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-15221" }, { "category": "external", "summary": "RHBZ#1749974", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1749974" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-15221", "url": "https://www.cve.org/CVERecord?id=CVE-2019-15221" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-15221", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-15221" } ], "release_date": "2019-08-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-04-28T15:41:38+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:1567" }, { "category": "workaround", "details": "To mitigate this issue, prevent module snd-usb-line6 from being loaded. Please see https://access.redhat.com/solutions/41278 for how to blacklist a kernel module to prevent it from loading automatically.", "product_ids": [ "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "PHYSICAL", "availabilityImpact": "HIGH", "baseScore": 4.6, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "kernel: Null pointer dereference in the sound/usb/line6/pcm.c" }, { "cve": "CVE-2019-15223", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "discovery_date": "2019-08-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1749976" } ], "notes": [ { "category": "description", "text": "A NULL pointer dereference flaw was found in the way the Line 6 POD USB driver in the Linux kernel handled disconnection. This flaw allows an attacker with physical access to the system to crash the system.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: Null pointer dereference in the sound/usb/line6/driver.c", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue is rated as having Low impact because of the physical access needed to trigger this issue.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-15223" }, { "category": "external", "summary": "RHBZ#1749976", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1749976" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-15223", "url": "https://www.cve.org/CVERecord?id=CVE-2019-15223" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-15223", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-15223" } ], "release_date": "2019-08-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-04-28T15:41:38+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:1567" }, { "category": "workaround", "details": "To mitigate this issue, prevent module snd-usb-line6 from being loaded. Please see https://access.redhat.com/solutions/41278 for how to blacklist a kernel module to prevent it from loading automatically.", "product_ids": [ "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "PHYSICAL", "availabilityImpact": "HIGH", "baseScore": 4.6, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "kernel: Null pointer dereference in the sound/usb/line6/driver.c" }, { "cve": "CVE-2019-16234", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "discovery_date": "2019-10-10T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1760441" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Linux kernel. A check was not done on the alloc_workqueue return value of the iwl_trans_pcie_alloc function potentially leading to a NULL pointer dereference. This error condition could lead to a denial of service. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: null pointer dereference in drivers/net/wireless/intel/iwlwifi/pcie/trans.c", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue is rated as having Low impact because of the preconditions needed to trigger the error/resource cleanup code path (system-wide out-of-memory condition, high privileges or physical access). The attacker would have to be able to induce system-wide out-of-memory condition which itself could be seen as a local denial of service. It could be argued that having such privileges has the same impact as the flaw itself.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-16234" }, { "category": "external", "summary": "RHBZ#1760441", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1760441" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-16234", "url": "https://www.cve.org/CVERecord?id=CVE-2019-16234" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-16234", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-16234" }, { "category": "external", "summary": "https://lkml.org/lkml/2019/9/9/487", "url": "https://lkml.org/lkml/2019/9/9/487" } ], "release_date": "2019-09-09T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-04-28T15:41:38+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:1567" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 4.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "kernel: null pointer dereference in drivers/net/wireless/intel/iwlwifi/pcie/trans.c" }, { "cve": "CVE-2019-17053", "cwe": { "id": "CWE-250", "name": "Execution with Unnecessary Privileges" }, "discovery_date": "2019-10-03T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1758242" } ], "notes": [ { "category": "description", "text": "A vulnerability was discovered in the Linux kernel\u0027s AF_IEEE802154 networking module where permissions checks are not enforced. This can allow an unprivileged user to create raw sockets for this protocol leading to the potential for data leaks or system unavailability.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: unprivileged users able to create RAW sockets in AF_IEEE802154 network protocol", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw is rated as moderate; there are no known exploits using this mechanism as an attack surface against the system affected by this bug.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-17053" }, { "category": "external", "summary": "RHBZ#1758242", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1758242" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-17053", "url": "https://www.cve.org/CVERecord?id=CVE-2019-17053" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-17053", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-17053" } ], "release_date": "2019-09-20T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-04-28T15:41:38+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:1567" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 4.0, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L", "version": "3.0" }, "products": [ "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: unprivileged users able to create RAW sockets in AF_IEEE802154 network protocol" }, { "cve": "CVE-2019-17055", "cwe": { "id": "CWE-250", "name": "Execution with Unnecessary Privileges" }, "discovery_date": "2019-10-03T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1758248" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in the Linux kernel\u2019s implementation of the AF_ISDN protocol, which does not enforce the CAP_NET_RAW capability. This flaw can allow unprivileged users to create a raw socket for this protocol. This could further allow the user to control the availability of an existing ISDN circuit.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: unprivileged users able to create RAW sockets in AF_ISDN network protocol", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-17055" }, { "category": "external", "summary": "RHBZ#1758248", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1758248" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-17055", "url": "https://www.cve.org/CVERecord?id=CVE-2019-17055" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-17055", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-17055" } ], "release_date": "2019-09-20T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-04-28T15:41:38+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:1567" }, { "category": "workaround", "details": "At this time the only known way to \u0027mitigate\u0027 this flaw is to blacklist the kernel module from being loaded. Creating raw sockets with this protocol is a method of communicating with ISDN hardware, a technology that is becoming less and less common.\n\nCheck https://access.redhat.com/solutions/41278 for instructions on how to disable the mISDN_core.ko module.", "product_ids": [ "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 4.0, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: unprivileged users able to create RAW sockets in AF_ISDN network protocol" }, { "cve": "CVE-2019-18282", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2020-01-17T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1796360" } ], "notes": [ { "category": "description", "text": "A device tracking vulnerability was found in the flow_dissector feature in the Linux kernel. This flaw occurs because the auto flowlabel of the UDP IPv6 packet relies on a 32-bit hashmd value as a secret, and jhash (instead of siphash) is used. The hashmd value remains the same starting from boot time and can be inferred by an attacker.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: The flow_dissector feature allows device tracking", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-18282" }, { "category": "external", "summary": "RHBZ#1796360", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1796360" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-18282", "url": "https://www.cve.org/CVERecord?id=CVE-2019-18282" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-18282", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-18282" } ], "release_date": "2019-10-22T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-04-28T15:41:38+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:1567" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: The flow_dissector feature allows device tracking" }, { "cve": "CVE-2019-18805", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "discovery_date": "2019-11-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1771496" } ], "notes": [ { "category": "description", "text": "A flaw was reported in the Linux kernel\u0027s TCP subsystem while calculating a packet round trip time, when a sysctl parameter (/proc/sys/net/ipv4/tcp_min_rtt_wlen) is set incorrectly. This causes an integer overflow which can lead to a denial Of service (DOS) attack.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: integer overflow in tcp_ack_update_rtt in net/ipv4/tcp_input.c", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-18805" }, { "category": "external", "summary": "RHBZ#1771496", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1771496" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-18805", "url": "https://www.cve.org/CVERecord?id=CVE-2019-18805" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-18805", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-18805" } ], "release_date": "2019-04-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-04-28T15:41:38+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:1567" }, { "category": "workaround", "details": "This flaw can be mitigated by setting the sysctl parameter (/proc/sys/net/ipv4/tcp_min_rtt_wlen) with 300 which means the packet time will not exceed more then 5 minutes and which should not cause an integer overflow.", "product_ids": [ "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.3, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H", "version": "3.0" }, "products": [ "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: integer overflow in tcp_ack_update_rtt in net/ipv4/tcp_input.c" }, { "cve": "CVE-2019-19045", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-11-18T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1774983" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Linux kernel. The Mellanox Technologies Innova driver mishandles resource cleanup on error. An attacker, able to trigger error could use this flaw to crash the system. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: dos in mlx5_fpga_conn_create_cq() function in drivers/net/ethernet/mellanox/mlx5/core/fpga/conn.c", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue is rated as having Moderate impact because of the privileges needed to trigger the resource cleanup code path.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-19045" }, { "category": "external", "summary": "RHBZ#1774983", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1774983" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-19045", "url": "https://www.cve.org/CVERecord?id=CVE-2019-19045" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-19045", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-19045" } ], "release_date": "2019-11-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-04-28T15:41:38+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:1567" }, { "category": "workaround", "details": "In order to mitigate this issue it is possible to prevent the affected code from being loaded by blacklisting the kernel module mlx5_core. For instructions relating to how to blacklist a kernel module refer to: https://access.redhat.com/solutions/41278 .", "product_ids": [ "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "HIGH", "baseScore": 4.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: dos in mlx5_fpga_conn_create_cq() function in drivers/net/ethernet/mellanox/mlx5/core/fpga/conn.c" }, { "cve": "CVE-2019-19047", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-11-18T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1774991" } ], "notes": [ { "category": "description", "text": "A flaw was found in the way the Mellanox 5th generation network adapters (ConnectX series) core driver in the Linux kernel handled resource cleanup in the mlx5_fw_fatal_reporter_dump function. This flaw allows an attacker with the ability to trigger errors in the mlx5_crdump_collect function to crash the system.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: dos in mlx5_fw_fatal_reporter_dump() function in drivers/net/ethernet/mellanox/mlx5/core/health.c", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue is rated as having Low impact because of the preconditions needed to trigger the resource cleanup code path.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-19047" }, { "category": "external", "summary": "RHBZ#1774991", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1774991" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-19047", "url": "https://www.cve.org/CVERecord?id=CVE-2019-19047" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-19047", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-19047" } ], "release_date": "2019-11-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-04-28T15:41:38+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:1567" }, { "category": "workaround", "details": "In order to mitigate this issue it is possible to prevent the affected code from being loaded by blacklisting the kernel module mlx5_core. For instructions relating to how to blacklist a kernel module refer to: https://access.redhat.com/solutions/41278 .", "product_ids": [ "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "kernel: dos in mlx5_fw_fatal_reporter_dump() function in drivers/net/ethernet/mellanox/mlx5/core/health.c" }, { "cve": "CVE-2019-19055", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-11-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1775074" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Linux kernel. The Wireless configuration API functionality mishandles resource cleanup in nl80211_get_ftm_responder_stats function. An attacker able to trigger the resource cleanup code path could use this flaw to crash the system. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: memory leak in the nl80211_get_ftm_responder_stats() function in net/wireless/nl80211.c allows DoS", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue is rated as having Moderate impact because of the preconditions needed to trigger the resource cleanup code path.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-19055" }, { "category": "external", "summary": "RHBZ#1775074", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1775074" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-19055", "url": "https://www.cve.org/CVERecord?id=CVE-2019-19055" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-19055", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-19055" } ], "release_date": "2019-10-05T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-04-28T15:41:38+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:1567" }, { "category": "workaround", "details": "In order to mitigate this issue it is possible to prevent the affected code from being loaded by blacklisting the kernel module cfg80211. For instructions relating to how to blacklist a kernel module refer to: https://access.redhat.com/solutions/41278 .", "product_ids": [ "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: memory leak in the nl80211_get_ftm_responder_stats() function in net/wireless/nl80211.c allows DoS" }, { "cve": "CVE-2019-19057", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-11-18T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1775050" } ], "notes": [ { "category": "description", "text": "Two memory leak flaws were found in the Linux kernel\u0027s mwifiex_pcie_init_evt_ring() function. A local attacker, able to reload the kernel module or hotplug Marvell WiFi hardware using this driver, can cause a denial of service (memory consumption) by triggering mwifiex_map_pci_memory() failures.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: Two memory leaks in the mwifiex_pcie_init_evt_ring() function in drivers/net/wireless/marvell/mwifiex/pcie.c allows for a DoS", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-19057" }, { "category": "external", "summary": "RHBZ#1775050", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1775050" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-19057", "url": "https://www.cve.org/CVERecord?id=CVE-2019-19057" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-19057", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-19057" } ], "release_date": "2019-11-21T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-04-28T15:41:38+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:1567" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 4.0, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "kernel: Two memory leaks in the mwifiex_pcie_init_evt_ring() function in drivers/net/wireless/marvell/mwifiex/pcie.c allows for a DoS" }, { "cve": "CVE-2019-19058", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-11-18T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1775047" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Linux kernel. The Intel Wireless WiFi MVM Firmware driver mishandles resource cleanup during device coredump. An attacker able to trigger the device coredump and system-wide out of memory conditions at the same time could use this flaw to crash the system. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: A memory leak in the alloc_sgtable() function in drivers/net/wireless/intel/iwlwifi/fw/dbg.c allows for a DoS", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue is rated as having Low impact because of the preconditions needed to trigger the resource cleanup code path (system-wide out-of-memory condition).", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-19058" }, { "category": "external", "summary": "RHBZ#1775047", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1775047" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-19058", "url": "https://www.cve.org/CVERecord?id=CVE-2019-19058" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-19058", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-19058" } ], "release_date": "2019-11-21T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-04-28T15:41:38+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:1567" }, { "category": "workaround", "details": "In order to mitigate this issue it is possible to prevent the affected code from being loaded by blacklisting the kernel module iwlmvm. For instructions relating to how to blacklist a kernel module refer to: https://access.redhat.com/solutions/41278 .", "product_ids": [ "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 4.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "kernel: A memory leak in the alloc_sgtable() function in drivers/net/wireless/intel/iwlwifi/fw/dbg.c allows for a DoS" }, { "cve": "CVE-2019-19059", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-11-18T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1775042" } ], "notes": [ { "category": "description", "text": "A flaw was found in the way the Intel Wireless driver in the Linux kernel handled resource cleanup during Gen 3 device initialization. This flaw allows an attacker with the ability to restrict access to DMA coherent memory on device initialization, to crash the system.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: Multiple memory leaks in the iwl_pcie_ctxt_info_gen3_init() function in drivers/net/wireless/intel/iwlwifi/pcie/ctxt-info-gen3.c allows for a DoS", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue is rated as having Low impact because of the preconditions needed to trigger the resource cleanup code path (ability to restrict access to dma coherent memory on device initialization).", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-19059" }, { "category": "external", "summary": "RHBZ#1775042", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1775042" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-19059", "url": "https://www.cve.org/CVERecord?id=CVE-2019-19059" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-19059", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-19059" } ], "release_date": "2019-11-21T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-04-28T15:41:38+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:1567" }, { "category": "workaround", "details": "In order to mitigate this issue it is possible to prevent the affected code from being loaded by blacklisting the kernel module iwlwifi. For instructions relating to how to blacklist a kernel module refer to: https://access.redhat.com/solutions/41278 .", "product_ids": [ "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 4.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "kernel: Multiple memory leaks in the iwl_pcie_ctxt_info_gen3_init() function in drivers/net/wireless/intel/iwlwifi/pcie/ctxt-info-gen3.c allows for a DoS" }, { "cve": "CVE-2019-19065", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-11-18T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1775000" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Linux kernel. The Intel OPA Gen1 driver mishandles resource cleanup. An attacker able to induce low memory condition on the system could use this flaw to crash the system. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: A memory leak in the sdma_init() function in drivers/infiniband/hw/hfi1/sdma.c allows for a DoS", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue is rated as having Low impact because of the preconditions needed to trigger the resource cleanup code path (system-wide out-of-memory condition).", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-19065" }, { "category": "external", "summary": "RHBZ#1775000", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1775000" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-19065", "url": "https://www.cve.org/CVERecord?id=CVE-2019-19065" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-19065", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-19065" } ], "release_date": "2019-11-21T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-04-28T15:41:38+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:1567" }, { "category": "workaround", "details": "In order to mitigate this issue it is possible to prevent the affected code from being loaded by blacklisting the kernel module hfi1. For instructions relating to how to blacklist a kernel module refer to: https://access.redhat.com/solutions/41278 .", "product_ids": [ "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 4.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "kernel: A memory leak in the sdma_init() function in drivers/infiniband/hw/hfi1/sdma.c allows for a DoS" }, { "cve": "CVE-2019-19067", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-11-18T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1774968" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Linux kernel. The acp_hw_init function fails to cleanup resources properly. A local attacker can induce an error condition to crash the system. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: Four memory leaks in the acp_hw_init() function in drivers/gpu/drm/amd/amdgpu/amdgpu_acp.c allow for a DoS", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue is rated as having Low impact because of the preconditions needed to trigger the error/resource cleanup code path.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-19067" }, { "category": "external", "summary": "RHBZ#1774968", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1774968" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-19067", "url": "https://www.cve.org/CVERecord?id=CVE-2019-19067" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-19067", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-19067" } ], "release_date": "2019-11-21T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-04-28T15:41:38+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:1567" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 4.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "kernel: Four memory leaks in the acp_hw_init() function in drivers/gpu/drm/amd/amdgpu/amdgpu_acp.c allow for a DoS" }, { "cve": "CVE-2019-19073", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-11-18T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1774937" } ], "notes": [ { "category": "description", "text": "Memory leaks in drivers/net/wireless/ath/ath9k/htc_hst.c in the Linux kernel through 5.3.11 allow attackers to cause a denial of service (memory consumption) by triggering wait_for_completion_timeout() failures. This affects the htc_config_pipe_credits() function, the htc_setup_complete() function, and the htc_connect_service() function, aka CID-853acf7caf10.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: Memory leaks in drivers/net/wireless/ath/ath9k/htc_hst.c in the Linux kernel (DOS)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-19073" }, { "category": "external", "summary": "RHBZ#1774937", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1774937" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-19073", "url": "https://www.cve.org/CVERecord?id=CVE-2019-19073" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-19073", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-19073" } ], "release_date": "2019-11-21T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-04-28T15:41:38+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:1567" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 4.0, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "kernel: Memory leaks in drivers/net/wireless/ath/ath9k/htc_hst.c in the Linux kernel (DOS)" }, { "cve": "CVE-2019-19074", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "discovery_date": "2019-11-18T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1774933" } ], "notes": [ { "category": "description", "text": "A memory leak in the ath9k_wmi_cmd() function in drivers/net/wireless/ath/ath9k/wmi.c in the Linux kernel through 5.3.11 allows attackers to cause a denial of service (memory consumption), aka CID-728c1e2a05e4.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: a memory leak in the ath9k management function in allows local DoS", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-19074" }, { "category": "external", "summary": "RHBZ#1774933", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1774933" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-19074", "url": "https://www.cve.org/CVERecord?id=CVE-2019-19074" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-19074", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-19074" } ], "release_date": "2019-11-21T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-04-28T15:41:38+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:1567" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "kernel: a memory leak in the ath9k management function in allows local DoS" }, { "cve": "CVE-2019-19077", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-11-22T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1775724" } ], "notes": [ { "category": "description", "text": "A memory leak flaw was found in the Broadcom NetXtreme HCA driver in the Linux kernel, in the way it handled resource cleanup on the copy to userspace error. This flaw allows a local attacker to trigger this error and crash the system.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: memory leak in bnxt_re_create_srq function in drivers/infiniband/hw/bnxt_re/ib_verbs.c", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue is rated as having Moderate impact because local attacker is needed in order to trigger it.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-19077" }, { "category": "external", "summary": "RHBZ#1775724", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1775724" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-19077", "url": "https://www.cve.org/CVERecord?id=CVE-2019-19077" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-19077", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-19077" } ], "release_date": "2019-09-10T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-04-28T15:41:38+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:1567" }, { "category": "workaround", "details": "In order to mitigate this issue it is possible to prevent the affected code from being loaded by blacklisting the kernel module bnxt_re. For instructions relating to how to blacklist a kernel module refer to: https://access.redhat.com/solutions/41278 .", "product_ids": [ "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: memory leak in bnxt_re_create_srq function in drivers/infiniband/hw/bnxt_re/ib_verbs.c" }, { "cve": "CVE-2019-19532", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "discovery_date": "2019-12-10T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1781821" } ], "notes": [ { "category": "description", "text": "An out-of-bounds write flaw was found in the Linux kernel\u2019s HID drivers. An attacker, able to plug in a malicious USB device, can crash the system or read and write to memory with an incorrect address.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: malicious USB devices can lead to multiple out-of-bounds write", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue was rated as having Moderate impact because of the need of physical access to trigger it.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-19532" }, { "category": "external", "summary": "RHBZ#1781821", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1781821" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-19532", "url": "https://www.cve.org/CVERecord?id=CVE-2019-19532" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-19532", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-19532" } ], "release_date": "2019-12-03T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-04-28T15:41:38+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:1567" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "PHYSICAL", "availabilityImpact": "HIGH", "baseScore": 6.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: malicious USB devices can lead to multiple out-of-bounds write" }, { "cve": "CVE-2019-19534", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2019-12-04T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1783540" } ], "notes": [ { "category": "description", "text": "An information-leak flaw was found in the Linux kernel\u0027s pcan USB driver. When a device using this driver connects to the system, the stack information is leaked to the CAN bus, a controller area network for automobiles. The highest threat with this vulnerability is breach of data confidentiality.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: information leak bug caused by a malicious USB device in the drivers/net/can/usb/peak_usb/pcan_usb_core.c driver", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-19534" }, { "category": "external", "summary": "RHBZ#1783540", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1783540" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-19534", "url": "https://www.cve.org/CVERecord?id=CVE-2019-19534" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-19534", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-19534" } ], "release_date": "2019-11-04T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-04-28T15:41:38+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:1567" }, { "category": "workaround", "details": "As the devices module will be auto-loaded when the USB CAN bus adapter is connected, its can be disabled by preventing the module from loading with the following instructions:\n\n# echo \"install peak_usb /bin/true\" \u003e\u003e /etc/modprobe.d/disable-peak-usb-canbus.conf \n \nThe system will need to be restarted if the peak_usb module is already loaded. In most circumstances, the kernel modules will be unable to be unloaded while any CAN bus interfaces are active and the protocol is in use. If the system requires this module to work correctly, this mitigation may not be suitable. If you need further assistance, see KCS article https://access.redhat.com/solutions/41278 or contact Red Hat Global Support Services.", "product_ids": [ "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "PHYSICAL", "availabilityImpact": "NONE", "baseScore": 4.6, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: information leak bug caused by a malicious USB device in the drivers/net/can/usb/peak_usb/pcan_usb_core.c driver" }, { "cve": "CVE-2019-19768", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2019-12-23T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1786164" } ], "notes": [ { "category": "description", "text": "A use-after-free vulnerability was found in the Linux kernel\u2019s implementation of blktrace in the __blk_add_trace function. A local attacker with permissions to run block trace instructions against a device can create a situation where the core block_trace object is used after it is freed. The attacker can pre-groom memory to race this use-after-free to create a condition where the memory is corrupted and cause privilege escalation.\r\n\r\nThe ability to create this condition requires elevated privileges, and it has been decided that this change in Red Hat Enterprise Linux 5 and 6 would risk introducing possible regressions and will not be backported.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: use-after-free in __blk_add_trace in kernel/trace/blktrace.c", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-19768" }, { "category": "external", "summary": "RHBZ#1786164", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1786164" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-19768", "url": "https://www.cve.org/CVERecord?id=CVE-2019-19768" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-19768", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-19768" } ], "release_date": "2019-11-29T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-04-28T15:41:38+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:1567" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: use-after-free in __blk_add_trace in kernel/trace/blktrace.c" }, { "cve": "CVE-2019-19922", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2020-01-17T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1792512" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Linux kernel\u2019s scheduler, where it can allow attackers to cause a denial of service against non-CPU-bound applications by generating a workload that triggers unwanted scheduling slice expiration. A local attacker who can trigger a specific workload type could abuse this technique to trigger a system to be seen as degraded, and possibly trigger workload-rebalance in systems that use the slice-expiration metric as a measure of system health.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: when cpu.cfs_quota_us is used allows attackers to cause a denial of service against non-cpu-bound applications", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-19922" }, { "category": "external", "summary": "RHBZ#1792512", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1792512" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-19922", "url": "https://www.cve.org/CVERecord?id=CVE-2019-19922" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-19922", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-19922" } ], "release_date": "2019-12-22T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-04-28T15:41:38+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:1567" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "kernel: when cpu.cfs_quota_us is used allows attackers to cause a denial of service against non-cpu-bound applications" }, { "acknowledgments": [ { "names": [ "Xiumei Mu" ], "organization": "Red Hat QE Engineering", "summary": "This issue was discovered by Red Hat." } ], "cve": "CVE-2020-1749", "cwe": { "id": "CWE-319", "name": "Cleartext Transmission of Sensitive Information" }, "discovery_date": "2020-03-04T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1809833" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Linux kernel\u0027s implementation of some networking protocols in IPsec, such as VXLAN and GENEVE tunnels over IPv6. When an encrypted tunnel is created between two hosts, the kernel isn\u0027t correctly routing tunneled data over the encrypted link; rather sending the data unencrypted. This would allow anyone in between the two endpoints to read the traffic unencrypted. The main threat from this vulnerability is to data confidentiality.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: some ipv6 protocols not encrypted over ipsec tunnel", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-1749" }, { "category": "external", "summary": "RHBZ#1809833", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1809833" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-1749", "url": "https://www.cve.org/CVERecord?id=CVE-2020-1749" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-1749", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-1749" } ], "release_date": "2020-03-04T01:29:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-04-28T15:41:38+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:1567" }, { "category": "workaround", "details": "Disabling the IPV6 protocol may be a suitable workaround for systems that do not require the protocol to function correctly, however, if IPV6 is not in use this flaw will not be triggered.", "product_ids": [ "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: some ipv6 protocols not encrypted over ipsec tunnel" }, { "cve": "CVE-2020-7053", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2020-01-28T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1795624" } ], "notes": [ { "category": "description", "text": "A use-after-free flaw was found in the Linux kernel\u2019s GPU driver functionality when destroying GEM context. A local user could use this flaw to crash the system or potentially escalate their privileges.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: use-after-free in i915_ppgtt_close in drivers/gpu/drm/i915/i915_gem_gtt.c", "title": "Vulnerability summary" }, { "category": "other", "text": "The impact of this issue is Moderate, because attack is specific for certain Intel hardware and could be triggered only by local user with write access to the device.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-7053" }, { "category": "external", "summary": "RHBZ#1795624", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1795624" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-7053", "url": "https://www.cve.org/CVERecord?id=CVE-2020-7053" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-7053", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-7053" } ], "release_date": "2020-01-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-04-28T15:41:38+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:1567" }, { "category": "workaround", "details": "In case of dedicated graphic card presence and i915 GPU is not being used, you can prevent module i915 from being loaded. Please see https://access.redhat.com/solutions/41278 for how to blacklist a kernel module to prevent it from loading automatically.", "product_ids": [ "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: use-after-free in i915_ppgtt_close in drivers/gpu/drm/i915/i915_gem_gtt.c" }, { "cve": "CVE-2020-10690", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2019-11-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1817141" } ], "notes": [ { "category": "description", "text": "There is a use-after-free problem seen due to a race condition between the release of ptp_clock and cdev while resource deallocation. When a (high privileged) process allocates a ptp device file (like /dev/ptpX) and voluntarily goes to sleep. During this time if the underlying device is removed, it can cause an exploitable condition as the process wakes up to terminate and clean all attached files. The system crashes due to the cdev structure being invalid (as already freed) which is pointed to by the inode.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: use-after-free in cdev_put() when a PTP device is removed while it\u0027s chardev is open", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue is rated as having Low impact as there is a need for high privilege access to trigger this problem. This will need an access to /dev/ptpX which is privileged operation, also removing the module is needed (again, privileged operation).", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-10690" }, { "category": "external", "summary": "RHBZ#1817141", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1817141" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-10690", "url": "https://www.cve.org/CVERecord?id=CVE-2020-10690" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-10690", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-10690" } ], "release_date": "2019-11-25T12:53:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-04-28T15:41:38+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:1567" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "kernel: use-after-free in cdev_put() when a PTP device is removed while it\u0027s chardev is open" }, { "cve": "CVE-2021-33630", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "discovery_date": "2024-01-30T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2261974" } ], "notes": [ { "category": "description", "text": "A NULL pointer dereference flaw was found in the Linux kernel\u0027s network scheduler. This issue occurs when offloading is enabled, the cbs instance is not added to the list. The code also incorrectly handles the case when offload is disabled without removing the qdisc. This could allow a local user to cause a denial of service condition.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: net/sched: cbs NULL pointer dereference when offloading is enabled", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-33630" }, { "category": "external", "summary": "RHBZ#2261974", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2261974" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-33630", "url": "https://www.cve.org/CVERecord?id=CVE-2021-33630" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-33630", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-33630" }, { "category": "external", "summary": "https://seclists.org/oss-sec/2024/q1/65", "url": "https://seclists.org/oss-sec/2024/q1/65" } ], "release_date": "2024-01-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-04-28T15:41:38+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:1567" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "NFV-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "NFV-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.src", "RT-8.2.0.GA:kernel-rt-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-core-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-devel-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-kvm-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-0:4.18.0-193.rt13.51.el8.x86_64", "RT-8.2.0.GA:kernel-rt-modules-extra-0:4.18.0-193.rt13.51.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: net/sched: cbs NULL pointer dereference when offloading is enabled" } ] }
rhsa-2020:1769
Vulnerability from csaf_redhat
Published
2020-04-28 15:43
Modified
2025-03-17 02:33
Summary
Red Hat Security Advisory: kernel security, bug fix, and enhancement update
Notes
Topic
An update for kernel is now available for Red Hat Enterprise Linux 8.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: use-after-free in __blk_add_trace in kernel/trace/blktrace.c (CVE-2019-19768)
* kernel: nfs: NULL pointer dereference due to an anomalized NFS message sequence (CVE-2018-16871)
* kernel: memory leak in the kernel_read_file function in fs/exec.c allows to cause a denial of service (CVE-2019-8980)
* kernel: unprivileged users able to create RAW sockets in AF_IEEE802154 network protocol. (CVE-2019-17053)
* kernel: unprivileged users able to create RAW sockets in AF_ISDN network protocol. (CVE-2019-17055)
* kernel: integer overflow in tcp_ack_update_rtt in net/ipv4/tcp_input.c (CVE-2019-18805)
* kernel: information leak bug caused by a malicious USB device in the drivers/net/can/usb/peak_usb/pcan_usb_core.c driver (CVE-2019-19534)
* kernel: some ipv6 protocols not encrypted over ipsec tunnel. (CVE-2020-1749)
* Kernel: net: using kernel space address bits to derive IP ID may potentially break KASLR (CVE-2019-10639)
* kernel: An out-of-bounds read in drivers/scsi/qedi/qedi_dbg.c leading to crash or information disclosure (CVE-2019-15090)
* kernel: a NULL pointer dereference in drivers/net/wireless/ath/ath10k/usb.c leads to a crash (CVE-2019-15099)
* kernel: Null pointer dereference in the sound/usb/line6/pcm.c (CVE-2019-15221)
* kernel: Two memory leaks in the mwifiex_pcie_init_evt_ring() function in drivers/net/wireless/marvell/mwifiex/pcie.c allows for a DoS (CVE-2019-19057)
* kernel: Memory leaks in drivers/net/wireless/ath/ath9k/htc_hst.c in the Linux kernel (DOS) (CVE-2019-19073)
* kernel: a memory leak in the ath9k management function in allows local DoS (CVE-2019-19074)
* kernel: when cpu.cfs_quota_us is used allows attackers to cause a denial of service against non-cpu-bound applications (CVE-2019-19922)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
This update also fixes several bugs and adds various enhancements. Documentation for these changes is available from the Release Notes document linked to in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for kernel is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* kernel: use-after-free in __blk_add_trace in kernel/trace/blktrace.c (CVE-2019-19768)\n\n* kernel: nfs: NULL pointer dereference due to an anomalized NFS message sequence (CVE-2018-16871)\n\n* kernel: memory leak in the kernel_read_file function in fs/exec.c allows to cause a denial of service (CVE-2019-8980)\n\n* kernel: unprivileged users able to create RAW sockets in AF_IEEE802154 network protocol. (CVE-2019-17053)\n\n* kernel: unprivileged users able to create RAW sockets in AF_ISDN network protocol. (CVE-2019-17055)\n\n* kernel: integer overflow in tcp_ack_update_rtt in net/ipv4/tcp_input.c (CVE-2019-18805)\n\n* kernel: information leak bug caused by a malicious USB device in the drivers/net/can/usb/peak_usb/pcan_usb_core.c driver (CVE-2019-19534)\n\n* kernel: some ipv6 protocols not encrypted over ipsec tunnel. (CVE-2020-1749)\n\n* Kernel: net: using kernel space address bits to derive IP ID may potentially break KASLR (CVE-2019-10639)\n\n* kernel: An out-of-bounds read in drivers/scsi/qedi/qedi_dbg.c leading to crash or information disclosure (CVE-2019-15090)\n\n* kernel: a NULL pointer dereference in drivers/net/wireless/ath/ath10k/usb.c leads to a crash (CVE-2019-15099)\n\n* kernel: Null pointer dereference in the sound/usb/line6/pcm.c (CVE-2019-15221)\n\n* kernel: Two memory leaks in the mwifiex_pcie_init_evt_ring() function in drivers/net/wireless/marvell/mwifiex/pcie.c allows for a DoS (CVE-2019-19057)\n\n* kernel: Memory leaks in drivers/net/wireless/ath/ath9k/htc_hst.c in the Linux kernel (DOS) (CVE-2019-19073)\n\n* kernel: a memory leak in the ath9k management function in allows local DoS (CVE-2019-19074)\n\n* kernel: when cpu.cfs_quota_us is used allows attackers to cause a denial of service against non-cpu-bound applications (CVE-2019-19922)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nThis update also fixes several bugs and adds various enhancements. Documentation for these changes is available from the Release Notes document linked to in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2020:1769", "url": "https://access.redhat.com/errata/RHSA-2020:1769" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/8/html/8.2_release_notes/index", "url": "https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/8/html/8.2_release_notes/index" }, { "category": "external", "summary": "1655162", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1655162" }, { "category": "external", "summary": "1679972", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1679972" }, { "category": "external", "summary": "1729933", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1729933" }, { "category": "external", "summary": "1738741", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1738741" }, { "category": "external", "summary": "1743526", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1743526" }, { "category": "external", "summary": "1743560", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1743560" }, { "category": "external", "summary": "1749633", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1749633" }, { "category": "external", "summary": "1749974", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1749974" }, { "category": "external", "summary": "1752765", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1752765" }, { "category": "external", "summary": "1757902", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1757902" }, { "category": "external", "summary": "1758242", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1758242" }, { "category": "external", "summary": "1758248", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1758248" }, { "category": "external", "summary": "1765547", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1765547" }, { "category": "external", "summary": "1767664", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1767664" }, { "category": "external", "summary": "1771430", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1771430" }, { "category": "external", "summary": "1771496", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1771496" }, { "category": "external", "summary": "1771691", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1771691" }, { "category": "external", "summary": "1774933", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1774933" }, { "category": "external", "summary": "1774937", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1774937" }, { "category": "external", "summary": "1775050", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1775050" }, { "category": "external", "summary": "1783540", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1783540" }, { "category": "external", "summary": "1786164", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1786164" }, { "category": "external", "summary": "1789594", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1789594" }, { "category": "external", "summary": "1792512", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1792512" }, { "category": "external", "summary": "1795049", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1795049" }, { "category": "external", "summary": "1803162", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1803162" }, { "category": "external", "summary": "1809833", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1809833" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2020/rhsa-2020_1769.json" } ], "title": "Red Hat Security Advisory: kernel security, bug fix, and enhancement update", "tracking": { "current_release_date": "2025-03-17T02:33:46+00:00", "generator": { "date": "2025-03-17T02:33:46+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.4.1" } }, "id": "RHSA-2020:1769", "initial_release_date": "2020-04-28T15:43:14+00:00", "revision_history": [ { "date": "2020-04-28T15:43:14+00:00", "number": "1", "summary": "Initial version" }, { "date": "2020-04-28T15:43:14+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-03-17T02:33:46+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat CodeReady Linux Builder (v. 8)", "product": { "name": "Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.GA", "product_identification_helper": { "cpe": "cpe:/a:redhat:enterprise_linux:8::crb" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux BaseOS (v. 8)", "product": { "name": "Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.GA", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:8::baseos" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "product": { "name": "kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "product_id": "kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-libs-devel@4.18.0-193.el8?arch=aarch64" } } }, { "category": "product_version", "name": "bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "product": { "name": "bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "product_id": "bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-193.el8?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "product": { "name": "kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "product_id": "kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-193.el8?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:4.18.0-193.el8.aarch64", "product": { "name": "kernel-debuginfo-0:4.18.0-193.el8.aarch64", "product_id": "kernel-debuginfo-0:4.18.0-193.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-193.el8?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "product": { "name": "kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "product_id": "kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common-aarch64@4.18.0-193.el8?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "product": { "name": "kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "product_id": "kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-193.el8?arch=aarch64" } } }, { "category": "product_version", "name": "perf-debuginfo-0:4.18.0-193.el8.aarch64", "product": { "name": "perf-debuginfo-0:4.18.0-193.el8.aarch64", "product_id": "perf-debuginfo-0:4.18.0-193.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-193.el8?arch=aarch64" } } }, { "category": "product_version", "name": "python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "product": { "name": "python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "product_id": "python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-193.el8?arch=aarch64" } } }, { "category": "product_version", "name": "bpftool-0:4.18.0-193.el8.aarch64", "product": { "name": "bpftool-0:4.18.0-193.el8.aarch64", "product_id": "bpftool-0:4.18.0-193.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bpftool@4.18.0-193.el8?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-0:4.18.0-193.el8.aarch64", "product": { "name": "kernel-0:4.18.0-193.el8.aarch64", "product_id": "kernel-0:4.18.0-193.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@4.18.0-193.el8?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-core-0:4.18.0-193.el8.aarch64", "product": { "name": "kernel-core-0:4.18.0-193.el8.aarch64", "product_id": "kernel-core-0:4.18.0-193.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-core@4.18.0-193.el8?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-cross-headers-0:4.18.0-193.el8.aarch64", "product": { "name": "kernel-cross-headers-0:4.18.0-193.el8.aarch64", "product_id": "kernel-cross-headers-0:4.18.0-193.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-193.el8?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-debug-0:4.18.0-193.el8.aarch64", "product": { "name": "kernel-debug-0:4.18.0-193.el8.aarch64", "product_id": "kernel-debug-0:4.18.0-193.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@4.18.0-193.el8?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-debug-core-0:4.18.0-193.el8.aarch64", "product": { "name": "kernel-debug-core-0:4.18.0-193.el8.aarch64", "product_id": "kernel-debug-core-0:4.18.0-193.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-193.el8?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:4.18.0-193.el8.aarch64", "product": { "name": "kernel-debug-devel-0:4.18.0-193.el8.aarch64", "product_id": "kernel-debug-devel-0:4.18.0-193.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-193.el8?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-debug-modules-0:4.18.0-193.el8.aarch64", "product": { "name": "kernel-debug-modules-0:4.18.0-193.el8.aarch64", "product_id": "kernel-debug-modules-0:4.18.0-193.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-193.el8?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "product": { "name": "kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "product_id": "kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-193.el8?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-devel-0:4.18.0-193.el8.aarch64", "product": { "name": "kernel-devel-0:4.18.0-193.el8.aarch64", "product_id": "kernel-devel-0:4.18.0-193.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@4.18.0-193.el8?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-headers-0:4.18.0-193.el8.aarch64", "product": { "name": "kernel-headers-0:4.18.0-193.el8.aarch64", "product_id": "kernel-headers-0:4.18.0-193.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@4.18.0-193.el8?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-modules-0:4.18.0-193.el8.aarch64", "product": { "name": "kernel-modules-0:4.18.0-193.el8.aarch64", "product_id": "kernel-modules-0:4.18.0-193.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-modules@4.18.0-193.el8?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-modules-extra-0:4.18.0-193.el8.aarch64", "product": { "name": "kernel-modules-extra-0:4.18.0-193.el8.aarch64", "product_id": "kernel-modules-extra-0:4.18.0-193.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-193.el8?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-tools-0:4.18.0-193.el8.aarch64", "product": { "name": "kernel-tools-0:4.18.0-193.el8.aarch64", "product_id": "kernel-tools-0:4.18.0-193.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools@4.18.0-193.el8?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-tools-libs-0:4.18.0-193.el8.aarch64", "product": { "name": "kernel-tools-libs-0:4.18.0-193.el8.aarch64", "product_id": "kernel-tools-libs-0:4.18.0-193.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-libs@4.18.0-193.el8?arch=aarch64" } } }, { "category": "product_version", "name": "perf-0:4.18.0-193.el8.aarch64", "product": { "name": "perf-0:4.18.0-193.el8.aarch64", "product_id": "perf-0:4.18.0-193.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf@4.18.0-193.el8?arch=aarch64" } } }, { "category": "product_version", "name": "python3-perf-0:4.18.0-193.el8.aarch64", "product": { "name": "python3-perf-0:4.18.0-193.el8.aarch64", "product_id": "python3-perf-0:4.18.0-193.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-perf@4.18.0-193.el8?arch=aarch64" } } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "product": { "name": "kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "product_id": "kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-libs-devel@4.18.0-193.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "product": { "name": "bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "product_id": "bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-193.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "product": { "name": "kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "product_id": "kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-193.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "product": { "name": "kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "product_id": "kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-193.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "product": { "name": "kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "product_id": "kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common-ppc64le@4.18.0-193.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "product": { "name": "kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "product_id": "kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-193.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "perf-debuginfo-0:4.18.0-193.el8.ppc64le", "product": { "name": "perf-debuginfo-0:4.18.0-193.el8.ppc64le", "product_id": "perf-debuginfo-0:4.18.0-193.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-193.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "product": { "name": "python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "product_id": "python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-193.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "bpftool-0:4.18.0-193.el8.ppc64le", "product": { "name": "bpftool-0:4.18.0-193.el8.ppc64le", "product_id": "bpftool-0:4.18.0-193.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/bpftool@4.18.0-193.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-0:4.18.0-193.el8.ppc64le", "product": { "name": "kernel-0:4.18.0-193.el8.ppc64le", "product_id": "kernel-0:4.18.0-193.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@4.18.0-193.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-core-0:4.18.0-193.el8.ppc64le", "product": { "name": "kernel-core-0:4.18.0-193.el8.ppc64le", "product_id": "kernel-core-0:4.18.0-193.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-core@4.18.0-193.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "product": { "name": "kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "product_id": "kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-193.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debug-0:4.18.0-193.el8.ppc64le", "product": { "name": "kernel-debug-0:4.18.0-193.el8.ppc64le", "product_id": "kernel-debug-0:4.18.0-193.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@4.18.0-193.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debug-core-0:4.18.0-193.el8.ppc64le", "product": { "name": "kernel-debug-core-0:4.18.0-193.el8.ppc64le", "product_id": "kernel-debug-core-0:4.18.0-193.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-193.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "product": { "name": "kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "product_id": "kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-193.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "product": { "name": "kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "product_id": "kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-193.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "product": { "name": "kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "product_id": "kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-193.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-devel-0:4.18.0-193.el8.ppc64le", "product": { "name": "kernel-devel-0:4.18.0-193.el8.ppc64le", "product_id": "kernel-devel-0:4.18.0-193.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@4.18.0-193.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-headers-0:4.18.0-193.el8.ppc64le", "product": { "name": "kernel-headers-0:4.18.0-193.el8.ppc64le", "product_id": "kernel-headers-0:4.18.0-193.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@4.18.0-193.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-modules-0:4.18.0-193.el8.ppc64le", "product": { "name": "kernel-modules-0:4.18.0-193.el8.ppc64le", "product_id": "kernel-modules-0:4.18.0-193.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-modules@4.18.0-193.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "product": { "name": "kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "product_id": "kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-193.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-tools-0:4.18.0-193.el8.ppc64le", "product": { "name": "kernel-tools-0:4.18.0-193.el8.ppc64le", "product_id": "kernel-tools-0:4.18.0-193.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools@4.18.0-193.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "product": { "name": "kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "product_id": "kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-libs@4.18.0-193.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "perf-0:4.18.0-193.el8.ppc64le", "product": { "name": "perf-0:4.18.0-193.el8.ppc64le", "product_id": "perf-0:4.18.0-193.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf@4.18.0-193.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "python3-perf-0:4.18.0-193.el8.ppc64le", "product": { "name": "python3-perf-0:4.18.0-193.el8.ppc64le", "product_id": "python3-perf-0:4.18.0-193.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-perf@4.18.0-193.el8?arch=ppc64le" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "product": { "name": "kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "product_id": "kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-libs-devel@4.18.0-193.el8?arch=x86_64" } } }, { "category": "product_version", "name": "bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "product": { "name": "bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "product_id": "bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-193.el8?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "product": { "name": "kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "product_id": "kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-193.el8?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:4.18.0-193.el8.x86_64", "product": { "name": "kernel-debuginfo-0:4.18.0-193.el8.x86_64", "product_id": "kernel-debuginfo-0:4.18.0-193.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-193.el8?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "product": { "name": "kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "product_id": "kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common-x86_64@4.18.0-193.el8?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "product": { "name": "kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "product_id": "kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-193.el8?arch=x86_64" } } }, { "category": "product_version", "name": "perf-debuginfo-0:4.18.0-193.el8.x86_64", "product": { "name": "perf-debuginfo-0:4.18.0-193.el8.x86_64", "product_id": "perf-debuginfo-0:4.18.0-193.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-193.el8?arch=x86_64" } } }, { "category": "product_version", "name": "python3-perf-debuginfo-0:4.18.0-193.el8.x86_64", "product": { "name": "python3-perf-debuginfo-0:4.18.0-193.el8.x86_64", "product_id": "python3-perf-debuginfo-0:4.18.0-193.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-193.el8?arch=x86_64" } } }, { "category": "product_version", "name": "bpftool-0:4.18.0-193.el8.x86_64", "product": { "name": "bpftool-0:4.18.0-193.el8.x86_64", "product_id": "bpftool-0:4.18.0-193.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bpftool@4.18.0-193.el8?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-0:4.18.0-193.el8.x86_64", "product": { "name": "kernel-0:4.18.0-193.el8.x86_64", "product_id": "kernel-0:4.18.0-193.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@4.18.0-193.el8?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-core-0:4.18.0-193.el8.x86_64", "product": { "name": "kernel-core-0:4.18.0-193.el8.x86_64", "product_id": "kernel-core-0:4.18.0-193.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-core@4.18.0-193.el8?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-cross-headers-0:4.18.0-193.el8.x86_64", "product": { "name": "kernel-cross-headers-0:4.18.0-193.el8.x86_64", "product_id": "kernel-cross-headers-0:4.18.0-193.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-193.el8?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-0:4.18.0-193.el8.x86_64", "product": { "name": "kernel-debug-0:4.18.0-193.el8.x86_64", "product_id": "kernel-debug-0:4.18.0-193.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@4.18.0-193.el8?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-core-0:4.18.0-193.el8.x86_64", "product": { "name": "kernel-debug-core-0:4.18.0-193.el8.x86_64", "product_id": "kernel-debug-core-0:4.18.0-193.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-193.el8?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:4.18.0-193.el8.x86_64", "product": { "name": "kernel-debug-devel-0:4.18.0-193.el8.x86_64", "product_id": "kernel-debug-devel-0:4.18.0-193.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-193.el8?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-modules-0:4.18.0-193.el8.x86_64", "product": { "name": "kernel-debug-modules-0:4.18.0-193.el8.x86_64", "product_id": "kernel-debug-modules-0:4.18.0-193.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-193.el8?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "product": { "name": "kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "product_id": "kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-193.el8?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-devel-0:4.18.0-193.el8.x86_64", "product": { "name": "kernel-devel-0:4.18.0-193.el8.x86_64", "product_id": "kernel-devel-0:4.18.0-193.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@4.18.0-193.el8?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-headers-0:4.18.0-193.el8.x86_64", "product": { "name": "kernel-headers-0:4.18.0-193.el8.x86_64", "product_id": "kernel-headers-0:4.18.0-193.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@4.18.0-193.el8?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-modules-0:4.18.0-193.el8.x86_64", "product": { "name": "kernel-modules-0:4.18.0-193.el8.x86_64", "product_id": "kernel-modules-0:4.18.0-193.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-modules@4.18.0-193.el8?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-modules-extra-0:4.18.0-193.el8.x86_64", "product": { "name": "kernel-modules-extra-0:4.18.0-193.el8.x86_64", "product_id": "kernel-modules-extra-0:4.18.0-193.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-193.el8?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-tools-0:4.18.0-193.el8.x86_64", "product": { "name": "kernel-tools-0:4.18.0-193.el8.x86_64", "product_id": "kernel-tools-0:4.18.0-193.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools@4.18.0-193.el8?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-tools-libs-0:4.18.0-193.el8.x86_64", "product": { "name": "kernel-tools-libs-0:4.18.0-193.el8.x86_64", "product_id": "kernel-tools-libs-0:4.18.0-193.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-libs@4.18.0-193.el8?arch=x86_64" } } }, { "category": "product_version", "name": "perf-0:4.18.0-193.el8.x86_64", "product": { "name": "perf-0:4.18.0-193.el8.x86_64", "product_id": "perf-0:4.18.0-193.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf@4.18.0-193.el8?arch=x86_64" } } }, { "category": "product_version", "name": "python3-perf-0:4.18.0-193.el8.x86_64", "product": { "name": "python3-perf-0:4.18.0-193.el8.x86_64", "product_id": "python3-perf-0:4.18.0-193.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-perf@4.18.0-193.el8?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "bpftool-0:4.18.0-193.el8.s390x", "product": { "name": "bpftool-0:4.18.0-193.el8.s390x", "product_id": "bpftool-0:4.18.0-193.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/bpftool@4.18.0-193.el8?arch=s390x" } } }, { "category": "product_version", "name": "kernel-0:4.18.0-193.el8.s390x", "product": { "name": "kernel-0:4.18.0-193.el8.s390x", "product_id": "kernel-0:4.18.0-193.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@4.18.0-193.el8?arch=s390x" } } }, { "category": "product_version", "name": "kernel-core-0:4.18.0-193.el8.s390x", "product": { "name": "kernel-core-0:4.18.0-193.el8.s390x", "product_id": "kernel-core-0:4.18.0-193.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-core@4.18.0-193.el8?arch=s390x" } } }, { "category": "product_version", "name": "kernel-cross-headers-0:4.18.0-193.el8.s390x", "product": { "name": "kernel-cross-headers-0:4.18.0-193.el8.s390x", "product_id": "kernel-cross-headers-0:4.18.0-193.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-193.el8?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debug-0:4.18.0-193.el8.s390x", "product": { "name": "kernel-debug-0:4.18.0-193.el8.s390x", "product_id": "kernel-debug-0:4.18.0-193.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@4.18.0-193.el8?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debug-core-0:4.18.0-193.el8.s390x", "product": { "name": "kernel-debug-core-0:4.18.0-193.el8.s390x", "product_id": "kernel-debug-core-0:4.18.0-193.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-193.el8?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:4.18.0-193.el8.s390x", "product": { "name": "kernel-debug-devel-0:4.18.0-193.el8.s390x", "product_id": "kernel-debug-devel-0:4.18.0-193.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-193.el8?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debug-modules-0:4.18.0-193.el8.s390x", "product": { "name": "kernel-debug-modules-0:4.18.0-193.el8.s390x", "product_id": "kernel-debug-modules-0:4.18.0-193.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-193.el8?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "product": { "name": "kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "product_id": "kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-193.el8?arch=s390x" } } }, { "category": "product_version", "name": "kernel-devel-0:4.18.0-193.el8.s390x", "product": { "name": "kernel-devel-0:4.18.0-193.el8.s390x", "product_id": "kernel-devel-0:4.18.0-193.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@4.18.0-193.el8?arch=s390x" } } }, { "category": "product_version", "name": "kernel-headers-0:4.18.0-193.el8.s390x", "product": { "name": "kernel-headers-0:4.18.0-193.el8.s390x", "product_id": "kernel-headers-0:4.18.0-193.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@4.18.0-193.el8?arch=s390x" } } }, { "category": "product_version", "name": "kernel-modules-0:4.18.0-193.el8.s390x", "product": { "name": "kernel-modules-0:4.18.0-193.el8.s390x", "product_id": "kernel-modules-0:4.18.0-193.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-modules@4.18.0-193.el8?arch=s390x" } } }, { "category": "product_version", "name": "kernel-modules-extra-0:4.18.0-193.el8.s390x", "product": { "name": "kernel-modules-extra-0:4.18.0-193.el8.s390x", "product_id": "kernel-modules-extra-0:4.18.0-193.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-193.el8?arch=s390x" } } }, { "category": "product_version", "name": "kernel-tools-0:4.18.0-193.el8.s390x", "product": { "name": "kernel-tools-0:4.18.0-193.el8.s390x", "product_id": "kernel-tools-0:4.18.0-193.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools@4.18.0-193.el8?arch=s390x" } } }, { "category": "product_version", "name": "kernel-zfcpdump-0:4.18.0-193.el8.s390x", "product": { "name": "kernel-zfcpdump-0:4.18.0-193.el8.s390x", "product_id": "kernel-zfcpdump-0:4.18.0-193.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-zfcpdump@4.18.0-193.el8?arch=s390x" } } }, { "category": "product_version", "name": "kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "product": { "name": "kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "product_id": "kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-zfcpdump-core@4.18.0-193.el8?arch=s390x" } } }, { "category": "product_version", "name": "kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "product": { "name": "kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "product_id": "kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-zfcpdump-devel@4.18.0-193.el8?arch=s390x" } } }, { "category": "product_version", "name": "kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "product": { "name": "kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "product_id": "kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-zfcpdump-modules@4.18.0-193.el8?arch=s390x" } } }, { "category": "product_version", "name": "kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "product": { "name": "kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "product_id": "kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-zfcpdump-modules-extra@4.18.0-193.el8?arch=s390x" } } }, { "category": "product_version", "name": "perf-0:4.18.0-193.el8.s390x", "product": { "name": "perf-0:4.18.0-193.el8.s390x", "product_id": "perf-0:4.18.0-193.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf@4.18.0-193.el8?arch=s390x" } } }, { "category": "product_version", "name": "python3-perf-0:4.18.0-193.el8.s390x", "product": { "name": "python3-perf-0:4.18.0-193.el8.s390x", "product_id": "python3-perf-0:4.18.0-193.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-perf@4.18.0-193.el8?arch=s390x" } } }, { "category": "product_version", "name": "bpftool-debuginfo-0:4.18.0-193.el8.s390x", "product": { "name": "bpftool-debuginfo-0:4.18.0-193.el8.s390x", "product_id": "bpftool-debuginfo-0:4.18.0-193.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-193.el8?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "product": { "name": "kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "product_id": "kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-193.el8?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:4.18.0-193.el8.s390x", "product": { "name": "kernel-debuginfo-0:4.18.0-193.el8.s390x", "product_id": "kernel-debuginfo-0:4.18.0-193.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-193.el8?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "product": { "name": "kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "product_id": "kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common-s390x@4.18.0-193.el8?arch=s390x" } } }, { "category": "product_version", "name": "kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "product": { "name": "kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "product_id": "kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-193.el8?arch=s390x" } } }, { "category": "product_version", "name": "kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "product": { "name": "kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "product_id": "kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-zfcpdump-debuginfo@4.18.0-193.el8?arch=s390x" } } }, { "category": "product_version", "name": "perf-debuginfo-0:4.18.0-193.el8.s390x", "product": { "name": "perf-debuginfo-0:4.18.0-193.el8.s390x", "product_id": "perf-debuginfo-0:4.18.0-193.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-193.el8?arch=s390x" } } }, { "category": "product_version", "name": "python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "product": { "name": "python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "product_id": "python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-193.el8?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "kernel-0:4.18.0-193.el8.src", "product": { "name": "kernel-0:4.18.0-193.el8.src", "product_id": "kernel-0:4.18.0-193.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@4.18.0-193.el8?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "product": { "name": "kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "product_id": "kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-abi-whitelists@4.18.0-193.el8?arch=noarch" } } }, { "category": "product_version", "name": "kernel-doc-0:4.18.0-193.el8.noarch", "product": { "name": "kernel-doc-0:4.18.0-193.el8.noarch", "product_id": "kernel-doc-0:4.18.0-193.el8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-doc@4.18.0-193.el8?arch=noarch" } } } ], "category": "architecture", "name": "noarch" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "bpftool-0:4.18.0-193.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64" }, "product_reference": "bpftool-0:4.18.0-193.el8.aarch64", "relates_to_product_reference": "BaseOS-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-0:4.18.0-193.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le" }, "product_reference": "bpftool-0:4.18.0-193.el8.ppc64le", "relates_to_product_reference": "BaseOS-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-0:4.18.0-193.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x" }, "product_reference": "bpftool-0:4.18.0-193.el8.s390x", "relates_to_product_reference": "BaseOS-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-0:4.18.0-193.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64" }, "product_reference": "bpftool-0:4.18.0-193.el8.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-debuginfo-0:4.18.0-193.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64" }, "product_reference": "bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "relates_to_product_reference": "BaseOS-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-debuginfo-0:4.18.0-193.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le" }, "product_reference": "bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "relates_to_product_reference": "BaseOS-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-debuginfo-0:4.18.0-193.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x" }, "product_reference": "bpftool-debuginfo-0:4.18.0-193.el8.s390x", "relates_to_product_reference": "BaseOS-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-debuginfo-0:4.18.0-193.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64" }, "product_reference": "bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:4.18.0-193.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64" }, "product_reference": "kernel-0:4.18.0-193.el8.aarch64", "relates_to_product_reference": "BaseOS-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:4.18.0-193.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le" }, "product_reference": "kernel-0:4.18.0-193.el8.ppc64le", "relates_to_product_reference": "BaseOS-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:4.18.0-193.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x" }, "product_reference": "kernel-0:4.18.0-193.el8.s390x", "relates_to_product_reference": "BaseOS-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:4.18.0-193.el8.src as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.src" }, "product_reference": "kernel-0:4.18.0-193.el8.src", "relates_to_product_reference": "BaseOS-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:4.18.0-193.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64" }, "product_reference": "kernel-0:4.18.0-193.el8.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:4.18.0-193.el8.noarch as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch" }, "product_reference": "kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "relates_to_product_reference": "BaseOS-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-core-0:4.18.0-193.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64" }, "product_reference": "kernel-core-0:4.18.0-193.el8.aarch64", "relates_to_product_reference": "BaseOS-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-core-0:4.18.0-193.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le" }, "product_reference": "kernel-core-0:4.18.0-193.el8.ppc64le", "relates_to_product_reference": "BaseOS-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-core-0:4.18.0-193.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x" }, "product_reference": "kernel-core-0:4.18.0-193.el8.s390x", "relates_to_product_reference": "BaseOS-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-core-0:4.18.0-193.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64" }, "product_reference": "kernel-core-0:4.18.0-193.el8.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-cross-headers-0:4.18.0-193.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64" }, "product_reference": "kernel-cross-headers-0:4.18.0-193.el8.aarch64", "relates_to_product_reference": "BaseOS-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-cross-headers-0:4.18.0-193.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le" }, "product_reference": "kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "relates_to_product_reference": "BaseOS-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-cross-headers-0:4.18.0-193.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x" }, "product_reference": "kernel-cross-headers-0:4.18.0-193.el8.s390x", "relates_to_product_reference": "BaseOS-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-cross-headers-0:4.18.0-193.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64" }, "product_reference": "kernel-cross-headers-0:4.18.0-193.el8.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:4.18.0-193.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64" }, "product_reference": "kernel-debug-0:4.18.0-193.el8.aarch64", "relates_to_product_reference": "BaseOS-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:4.18.0-193.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le" }, "product_reference": "kernel-debug-0:4.18.0-193.el8.ppc64le", "relates_to_product_reference": "BaseOS-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:4.18.0-193.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x" }, "product_reference": "kernel-debug-0:4.18.0-193.el8.s390x", "relates_to_product_reference": "BaseOS-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:4.18.0-193.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64" }, "product_reference": "kernel-debug-0:4.18.0-193.el8.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-core-0:4.18.0-193.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64" }, "product_reference": "kernel-debug-core-0:4.18.0-193.el8.aarch64", "relates_to_product_reference": "BaseOS-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-core-0:4.18.0-193.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le" }, "product_reference": "kernel-debug-core-0:4.18.0-193.el8.ppc64le", "relates_to_product_reference": "BaseOS-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-core-0:4.18.0-193.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x" }, "product_reference": "kernel-debug-core-0:4.18.0-193.el8.s390x", "relates_to_product_reference": "BaseOS-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-core-0:4.18.0-193.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64" }, "product_reference": "kernel-debug-core-0:4.18.0-193.el8.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64" }, "product_reference": "kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "relates_to_product_reference": "BaseOS-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le" }, "product_reference": "kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "relates_to_product_reference": "BaseOS-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:4.18.0-193.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x" }, "product_reference": "kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "relates_to_product_reference": "BaseOS-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:4.18.0-193.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64" }, "product_reference": "kernel-debug-devel-0:4.18.0-193.el8.aarch64", "relates_to_product_reference": "BaseOS-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:4.18.0-193.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le" }, "product_reference": "kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "relates_to_product_reference": "BaseOS-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:4.18.0-193.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x" }, "product_reference": "kernel-debug-devel-0:4.18.0-193.el8.s390x", "relates_to_product_reference": "BaseOS-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:4.18.0-193.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64" }, "product_reference": "kernel-debug-devel-0:4.18.0-193.el8.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-0:4.18.0-193.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64" }, "product_reference": "kernel-debug-modules-0:4.18.0-193.el8.aarch64", "relates_to_product_reference": "BaseOS-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-0:4.18.0-193.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le" }, "product_reference": "kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "relates_to_product_reference": "BaseOS-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-0:4.18.0-193.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x" }, "product_reference": "kernel-debug-modules-0:4.18.0-193.el8.s390x", "relates_to_product_reference": "BaseOS-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-0:4.18.0-193.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64" }, "product_reference": "kernel-debug-modules-0:4.18.0-193.el8.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64" }, "product_reference": "kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "relates_to_product_reference": "BaseOS-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le" }, "product_reference": "kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "relates_to_product_reference": "BaseOS-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-extra-0:4.18.0-193.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x" }, "product_reference": "kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "relates_to_product_reference": "BaseOS-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64" }, "product_reference": "kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:4.18.0-193.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64" }, "product_reference": "kernel-debuginfo-0:4.18.0-193.el8.aarch64", "relates_to_product_reference": "BaseOS-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:4.18.0-193.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le" }, "product_reference": "kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "relates_to_product_reference": "BaseOS-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:4.18.0-193.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x" }, "product_reference": "kernel-debuginfo-0:4.18.0-193.el8.s390x", "relates_to_product_reference": "BaseOS-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:4.18.0-193.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64" }, "product_reference": "kernel-debuginfo-0:4.18.0-193.el8.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64" }, "product_reference": "kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "relates_to_product_reference": "BaseOS-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le" }, "product_reference": "kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "relates_to_product_reference": "BaseOS-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x" }, "product_reference": "kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "relates_to_product_reference": "BaseOS-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:4.18.0-193.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64" }, "product_reference": "kernel-devel-0:4.18.0-193.el8.aarch64", "relates_to_product_reference": "BaseOS-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:4.18.0-193.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le" }, "product_reference": "kernel-devel-0:4.18.0-193.el8.ppc64le", "relates_to_product_reference": "BaseOS-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:4.18.0-193.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x" }, "product_reference": "kernel-devel-0:4.18.0-193.el8.s390x", "relates_to_product_reference": "BaseOS-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:4.18.0-193.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64" }, "product_reference": "kernel-devel-0:4.18.0-193.el8.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:4.18.0-193.el8.noarch as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch" }, "product_reference": "kernel-doc-0:4.18.0-193.el8.noarch", "relates_to_product_reference": "BaseOS-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:4.18.0-193.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64" }, "product_reference": "kernel-headers-0:4.18.0-193.el8.aarch64", "relates_to_product_reference": "BaseOS-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:4.18.0-193.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le" }, "product_reference": "kernel-headers-0:4.18.0-193.el8.ppc64le", "relates_to_product_reference": "BaseOS-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:4.18.0-193.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x" }, "product_reference": "kernel-headers-0:4.18.0-193.el8.s390x", "relates_to_product_reference": "BaseOS-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:4.18.0-193.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64" }, "product_reference": "kernel-headers-0:4.18.0-193.el8.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-0:4.18.0-193.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64" }, "product_reference": "kernel-modules-0:4.18.0-193.el8.aarch64", "relates_to_product_reference": "BaseOS-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-0:4.18.0-193.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le" }, "product_reference": "kernel-modules-0:4.18.0-193.el8.ppc64le", "relates_to_product_reference": "BaseOS-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-0:4.18.0-193.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x" }, "product_reference": "kernel-modules-0:4.18.0-193.el8.s390x", "relates_to_product_reference": "BaseOS-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-0:4.18.0-193.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64" }, "product_reference": "kernel-modules-0:4.18.0-193.el8.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-extra-0:4.18.0-193.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64" }, "product_reference": "kernel-modules-extra-0:4.18.0-193.el8.aarch64", "relates_to_product_reference": "BaseOS-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-extra-0:4.18.0-193.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le" }, "product_reference": "kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "relates_to_product_reference": "BaseOS-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-extra-0:4.18.0-193.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x" }, "product_reference": "kernel-modules-extra-0:4.18.0-193.el8.s390x", "relates_to_product_reference": "BaseOS-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-extra-0:4.18.0-193.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64" }, "product_reference": "kernel-modules-extra-0:4.18.0-193.el8.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:4.18.0-193.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64" }, "product_reference": "kernel-tools-0:4.18.0-193.el8.aarch64", "relates_to_product_reference": "BaseOS-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:4.18.0-193.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le" }, "product_reference": "kernel-tools-0:4.18.0-193.el8.ppc64le", "relates_to_product_reference": "BaseOS-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:4.18.0-193.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x" }, "product_reference": "kernel-tools-0:4.18.0-193.el8.s390x", "relates_to_product_reference": "BaseOS-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:4.18.0-193.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64" }, "product_reference": "kernel-tools-0:4.18.0-193.el8.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64" }, "product_reference": "kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "relates_to_product_reference": "BaseOS-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le" }, "product_reference": "kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "relates_to_product_reference": "BaseOS-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:4.18.0-193.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x" }, "product_reference": "kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "relates_to_product_reference": "BaseOS-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64" }, "product_reference": "kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:4.18.0-193.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64" }, "product_reference": "kernel-tools-libs-0:4.18.0-193.el8.aarch64", "relates_to_product_reference": "BaseOS-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:4.18.0-193.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le" }, "product_reference": "kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "relates_to_product_reference": "BaseOS-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:4.18.0-193.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64" }, "product_reference": "kernel-tools-libs-0:4.18.0-193.el8.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64" }, "product_reference": "kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "relates_to_product_reference": "BaseOS-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le" }, "product_reference": "kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "relates_to_product_reference": "BaseOS-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64" }, "product_reference": "kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-zfcpdump-0:4.18.0-193.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x" }, "product_reference": "kernel-zfcpdump-0:4.18.0-193.el8.s390x", "relates_to_product_reference": "BaseOS-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-zfcpdump-core-0:4.18.0-193.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x" }, "product_reference": "kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "relates_to_product_reference": "BaseOS-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x" }, "product_reference": "kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "relates_to_product_reference": "BaseOS-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x" }, "product_reference": "kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "relates_to_product_reference": "BaseOS-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x" }, "product_reference": "kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "relates_to_product_reference": "BaseOS-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x" }, "product_reference": "kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "relates_to_product_reference": "BaseOS-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:4.18.0-193.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64" }, "product_reference": "perf-0:4.18.0-193.el8.aarch64", "relates_to_product_reference": "BaseOS-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:4.18.0-193.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le" }, "product_reference": "perf-0:4.18.0-193.el8.ppc64le", "relates_to_product_reference": "BaseOS-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:4.18.0-193.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.s390x" }, "product_reference": "perf-0:4.18.0-193.el8.s390x", "relates_to_product_reference": "BaseOS-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:4.18.0-193.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64" }, "product_reference": "perf-0:4.18.0-193.el8.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:4.18.0-193.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64" }, "product_reference": "perf-debuginfo-0:4.18.0-193.el8.aarch64", "relates_to_product_reference": "BaseOS-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:4.18.0-193.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le" }, "product_reference": "perf-debuginfo-0:4.18.0-193.el8.ppc64le", "relates_to_product_reference": "BaseOS-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:4.18.0-193.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x" }, "product_reference": "perf-debuginfo-0:4.18.0-193.el8.s390x", "relates_to_product_reference": "BaseOS-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:4.18.0-193.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64" }, "product_reference": "perf-debuginfo-0:4.18.0-193.el8.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-0:4.18.0-193.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64" }, "product_reference": "python3-perf-0:4.18.0-193.el8.aarch64", "relates_to_product_reference": "BaseOS-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-0:4.18.0-193.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le" }, "product_reference": "python3-perf-0:4.18.0-193.el8.ppc64le", "relates_to_product_reference": "BaseOS-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-0:4.18.0-193.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x" }, "product_reference": "python3-perf-0:4.18.0-193.el8.s390x", "relates_to_product_reference": "BaseOS-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-0:4.18.0-193.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64" }, "product_reference": "python3-perf-0:4.18.0-193.el8.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-debuginfo-0:4.18.0-193.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64" }, "product_reference": "python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "relates_to_product_reference": "BaseOS-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le" }, "product_reference": "python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "relates_to_product_reference": "BaseOS-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-debuginfo-0:4.18.0-193.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x" }, "product_reference": "python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "relates_to_product_reference": "BaseOS-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-debuginfo-0:4.18.0-193.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64" }, "product_reference": "python3-perf-debuginfo-0:4.18.0-193.el8.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-0:4.18.0-193.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64" }, "product_reference": "bpftool-0:4.18.0-193.el8.aarch64", "relates_to_product_reference": "CRB-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-0:4.18.0-193.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le" }, "product_reference": "bpftool-0:4.18.0-193.el8.ppc64le", "relates_to_product_reference": "CRB-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-0:4.18.0-193.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x" }, "product_reference": "bpftool-0:4.18.0-193.el8.s390x", "relates_to_product_reference": "CRB-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-0:4.18.0-193.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64" }, "product_reference": "bpftool-0:4.18.0-193.el8.x86_64", "relates_to_product_reference": "CRB-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-debuginfo-0:4.18.0-193.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64" }, "product_reference": "bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "relates_to_product_reference": "CRB-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-debuginfo-0:4.18.0-193.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le" }, "product_reference": "bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "relates_to_product_reference": "CRB-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-debuginfo-0:4.18.0-193.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x" }, "product_reference": "bpftool-debuginfo-0:4.18.0-193.el8.s390x", "relates_to_product_reference": "CRB-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-debuginfo-0:4.18.0-193.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64" }, "product_reference": "bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "relates_to_product_reference": "CRB-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:4.18.0-193.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64" }, "product_reference": "kernel-0:4.18.0-193.el8.aarch64", "relates_to_product_reference": "CRB-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:4.18.0-193.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le" }, "product_reference": "kernel-0:4.18.0-193.el8.ppc64le", "relates_to_product_reference": "CRB-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:4.18.0-193.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x" }, "product_reference": "kernel-0:4.18.0-193.el8.s390x", "relates_to_product_reference": "CRB-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:4.18.0-193.el8.src as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.src" }, "product_reference": "kernel-0:4.18.0-193.el8.src", "relates_to_product_reference": "CRB-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:4.18.0-193.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64" }, "product_reference": "kernel-0:4.18.0-193.el8.x86_64", "relates_to_product_reference": "CRB-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:4.18.0-193.el8.noarch as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch" }, "product_reference": "kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "relates_to_product_reference": "CRB-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-core-0:4.18.0-193.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64" }, "product_reference": "kernel-core-0:4.18.0-193.el8.aarch64", "relates_to_product_reference": "CRB-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-core-0:4.18.0-193.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le" }, "product_reference": "kernel-core-0:4.18.0-193.el8.ppc64le", "relates_to_product_reference": "CRB-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-core-0:4.18.0-193.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x" }, "product_reference": "kernel-core-0:4.18.0-193.el8.s390x", "relates_to_product_reference": "CRB-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-core-0:4.18.0-193.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64" }, "product_reference": "kernel-core-0:4.18.0-193.el8.x86_64", "relates_to_product_reference": "CRB-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-cross-headers-0:4.18.0-193.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64" }, "product_reference": "kernel-cross-headers-0:4.18.0-193.el8.aarch64", "relates_to_product_reference": "CRB-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-cross-headers-0:4.18.0-193.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le" }, "product_reference": "kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "relates_to_product_reference": "CRB-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-cross-headers-0:4.18.0-193.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x" }, "product_reference": "kernel-cross-headers-0:4.18.0-193.el8.s390x", "relates_to_product_reference": "CRB-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-cross-headers-0:4.18.0-193.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64" }, "product_reference": "kernel-cross-headers-0:4.18.0-193.el8.x86_64", "relates_to_product_reference": "CRB-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:4.18.0-193.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64" }, "product_reference": "kernel-debug-0:4.18.0-193.el8.aarch64", "relates_to_product_reference": "CRB-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:4.18.0-193.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le" }, "product_reference": "kernel-debug-0:4.18.0-193.el8.ppc64le", "relates_to_product_reference": "CRB-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:4.18.0-193.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x" }, "product_reference": "kernel-debug-0:4.18.0-193.el8.s390x", "relates_to_product_reference": "CRB-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:4.18.0-193.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64" }, "product_reference": "kernel-debug-0:4.18.0-193.el8.x86_64", "relates_to_product_reference": "CRB-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-core-0:4.18.0-193.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64" }, "product_reference": "kernel-debug-core-0:4.18.0-193.el8.aarch64", "relates_to_product_reference": "CRB-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-core-0:4.18.0-193.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le" }, "product_reference": "kernel-debug-core-0:4.18.0-193.el8.ppc64le", "relates_to_product_reference": "CRB-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-core-0:4.18.0-193.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x" }, "product_reference": "kernel-debug-core-0:4.18.0-193.el8.s390x", "relates_to_product_reference": "CRB-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-core-0:4.18.0-193.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64" }, "product_reference": "kernel-debug-core-0:4.18.0-193.el8.x86_64", "relates_to_product_reference": "CRB-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64" }, "product_reference": "kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "relates_to_product_reference": "CRB-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le" }, "product_reference": "kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "relates_to_product_reference": "CRB-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:4.18.0-193.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x" }, "product_reference": "kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "relates_to_product_reference": "CRB-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "relates_to_product_reference": "CRB-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:4.18.0-193.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64" }, "product_reference": "kernel-debug-devel-0:4.18.0-193.el8.aarch64", "relates_to_product_reference": "CRB-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:4.18.0-193.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le" }, "product_reference": "kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "relates_to_product_reference": "CRB-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:4.18.0-193.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x" }, "product_reference": "kernel-debug-devel-0:4.18.0-193.el8.s390x", "relates_to_product_reference": "CRB-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:4.18.0-193.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64" }, "product_reference": "kernel-debug-devel-0:4.18.0-193.el8.x86_64", "relates_to_product_reference": "CRB-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-0:4.18.0-193.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64" }, "product_reference": "kernel-debug-modules-0:4.18.0-193.el8.aarch64", "relates_to_product_reference": "CRB-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-0:4.18.0-193.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le" }, "product_reference": "kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "relates_to_product_reference": "CRB-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-0:4.18.0-193.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x" }, "product_reference": "kernel-debug-modules-0:4.18.0-193.el8.s390x", "relates_to_product_reference": "CRB-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-0:4.18.0-193.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64" }, "product_reference": "kernel-debug-modules-0:4.18.0-193.el8.x86_64", "relates_to_product_reference": "CRB-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64" }, "product_reference": "kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "relates_to_product_reference": "CRB-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le" }, "product_reference": "kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "relates_to_product_reference": "CRB-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-extra-0:4.18.0-193.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x" }, "product_reference": "kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "relates_to_product_reference": "CRB-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64" }, "product_reference": "kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "relates_to_product_reference": "CRB-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:4.18.0-193.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64" }, "product_reference": "kernel-debuginfo-0:4.18.0-193.el8.aarch64", "relates_to_product_reference": "CRB-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:4.18.0-193.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le" }, "product_reference": "kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "relates_to_product_reference": "CRB-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:4.18.0-193.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x" }, "product_reference": "kernel-debuginfo-0:4.18.0-193.el8.s390x", "relates_to_product_reference": "CRB-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:4.18.0-193.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64" }, "product_reference": "kernel-debuginfo-0:4.18.0-193.el8.x86_64", "relates_to_product_reference": "CRB-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64" }, "product_reference": "kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "relates_to_product_reference": "CRB-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le" }, "product_reference": "kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "relates_to_product_reference": "CRB-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x" }, "product_reference": "kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "relates_to_product_reference": "CRB-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "relates_to_product_reference": "CRB-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:4.18.0-193.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64" }, "product_reference": "kernel-devel-0:4.18.0-193.el8.aarch64", "relates_to_product_reference": "CRB-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:4.18.0-193.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le" }, "product_reference": "kernel-devel-0:4.18.0-193.el8.ppc64le", "relates_to_product_reference": "CRB-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:4.18.0-193.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x" }, "product_reference": "kernel-devel-0:4.18.0-193.el8.s390x", "relates_to_product_reference": "CRB-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:4.18.0-193.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64" }, "product_reference": "kernel-devel-0:4.18.0-193.el8.x86_64", "relates_to_product_reference": "CRB-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:4.18.0-193.el8.noarch as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch" }, "product_reference": "kernel-doc-0:4.18.0-193.el8.noarch", "relates_to_product_reference": "CRB-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:4.18.0-193.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64" }, "product_reference": "kernel-headers-0:4.18.0-193.el8.aarch64", "relates_to_product_reference": "CRB-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:4.18.0-193.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le" }, "product_reference": "kernel-headers-0:4.18.0-193.el8.ppc64le", "relates_to_product_reference": "CRB-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:4.18.0-193.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x" }, "product_reference": "kernel-headers-0:4.18.0-193.el8.s390x", "relates_to_product_reference": "CRB-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:4.18.0-193.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64" }, "product_reference": "kernel-headers-0:4.18.0-193.el8.x86_64", "relates_to_product_reference": "CRB-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-0:4.18.0-193.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64" }, "product_reference": "kernel-modules-0:4.18.0-193.el8.aarch64", "relates_to_product_reference": "CRB-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-0:4.18.0-193.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le" }, "product_reference": "kernel-modules-0:4.18.0-193.el8.ppc64le", "relates_to_product_reference": "CRB-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-0:4.18.0-193.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x" }, "product_reference": "kernel-modules-0:4.18.0-193.el8.s390x", "relates_to_product_reference": "CRB-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-0:4.18.0-193.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64" }, "product_reference": "kernel-modules-0:4.18.0-193.el8.x86_64", "relates_to_product_reference": "CRB-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-extra-0:4.18.0-193.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64" }, "product_reference": "kernel-modules-extra-0:4.18.0-193.el8.aarch64", "relates_to_product_reference": "CRB-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-extra-0:4.18.0-193.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le" }, "product_reference": "kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "relates_to_product_reference": "CRB-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-extra-0:4.18.0-193.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x" }, "product_reference": "kernel-modules-extra-0:4.18.0-193.el8.s390x", "relates_to_product_reference": "CRB-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-extra-0:4.18.0-193.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64" }, "product_reference": "kernel-modules-extra-0:4.18.0-193.el8.x86_64", "relates_to_product_reference": "CRB-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:4.18.0-193.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64" }, "product_reference": "kernel-tools-0:4.18.0-193.el8.aarch64", "relates_to_product_reference": "CRB-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:4.18.0-193.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le" }, "product_reference": "kernel-tools-0:4.18.0-193.el8.ppc64le", "relates_to_product_reference": "CRB-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:4.18.0-193.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x" }, "product_reference": "kernel-tools-0:4.18.0-193.el8.s390x", "relates_to_product_reference": "CRB-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:4.18.0-193.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64" }, "product_reference": "kernel-tools-0:4.18.0-193.el8.x86_64", "relates_to_product_reference": "CRB-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64" }, "product_reference": "kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "relates_to_product_reference": "CRB-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le" }, "product_reference": "kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "relates_to_product_reference": "CRB-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:4.18.0-193.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x" }, "product_reference": "kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "relates_to_product_reference": "CRB-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64" }, "product_reference": "kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "relates_to_product_reference": "CRB-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:4.18.0-193.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64" }, "product_reference": "kernel-tools-libs-0:4.18.0-193.el8.aarch64", "relates_to_product_reference": "CRB-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:4.18.0-193.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le" }, "product_reference": "kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "relates_to_product_reference": "CRB-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:4.18.0-193.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64" }, "product_reference": "kernel-tools-libs-0:4.18.0-193.el8.x86_64", "relates_to_product_reference": "CRB-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64" }, "product_reference": "kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "relates_to_product_reference": "CRB-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le" }, "product_reference": "kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "relates_to_product_reference": "CRB-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64" }, "product_reference": "kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "relates_to_product_reference": "CRB-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-zfcpdump-0:4.18.0-193.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x" }, "product_reference": "kernel-zfcpdump-0:4.18.0-193.el8.s390x", "relates_to_product_reference": "CRB-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-zfcpdump-core-0:4.18.0-193.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x" }, "product_reference": "kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "relates_to_product_reference": "CRB-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x" }, "product_reference": "kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "relates_to_product_reference": "CRB-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x" }, "product_reference": "kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "relates_to_product_reference": "CRB-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x" }, "product_reference": "kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "relates_to_product_reference": "CRB-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x" }, "product_reference": "kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "relates_to_product_reference": "CRB-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:4.18.0-193.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64" }, "product_reference": "perf-0:4.18.0-193.el8.aarch64", "relates_to_product_reference": "CRB-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:4.18.0-193.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le" }, "product_reference": "perf-0:4.18.0-193.el8.ppc64le", "relates_to_product_reference": "CRB-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:4.18.0-193.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.s390x" }, "product_reference": "perf-0:4.18.0-193.el8.s390x", "relates_to_product_reference": "CRB-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:4.18.0-193.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64" }, "product_reference": "perf-0:4.18.0-193.el8.x86_64", "relates_to_product_reference": "CRB-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:4.18.0-193.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64" }, "product_reference": "perf-debuginfo-0:4.18.0-193.el8.aarch64", "relates_to_product_reference": "CRB-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:4.18.0-193.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le" }, "product_reference": "perf-debuginfo-0:4.18.0-193.el8.ppc64le", "relates_to_product_reference": "CRB-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:4.18.0-193.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x" }, "product_reference": "perf-debuginfo-0:4.18.0-193.el8.s390x", "relates_to_product_reference": "CRB-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:4.18.0-193.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64" }, "product_reference": "perf-debuginfo-0:4.18.0-193.el8.x86_64", "relates_to_product_reference": "CRB-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-0:4.18.0-193.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64" }, "product_reference": "python3-perf-0:4.18.0-193.el8.aarch64", "relates_to_product_reference": "CRB-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-0:4.18.0-193.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le" }, "product_reference": "python3-perf-0:4.18.0-193.el8.ppc64le", "relates_to_product_reference": "CRB-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-0:4.18.0-193.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x" }, "product_reference": "python3-perf-0:4.18.0-193.el8.s390x", "relates_to_product_reference": "CRB-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-0:4.18.0-193.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64" }, "product_reference": "python3-perf-0:4.18.0-193.el8.x86_64", "relates_to_product_reference": "CRB-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-debuginfo-0:4.18.0-193.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64" }, "product_reference": "python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "relates_to_product_reference": "CRB-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le" }, "product_reference": "python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "relates_to_product_reference": "CRB-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-debuginfo-0:4.18.0-193.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x" }, "product_reference": "python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "relates_to_product_reference": "CRB-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-debuginfo-0:4.18.0-193.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64" }, "product_reference": "python3-perf-debuginfo-0:4.18.0-193.el8.x86_64", "relates_to_product_reference": "CRB-8.2.0.GA" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "Hangbin Liu" ], "organization": "Red Hat", "summary": "This issue was discovered by Red Hat." }, { "names": [ "Jasu Liedes" ], "organization": "Synopsys SIG" } ], "cve": "CVE-2018-16871", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "discovery_date": "2018-11-21T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1655162" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Linux kernel\u0027s NFS implementation. An attacker, who is able to mount an exported NFS filesystem, is able to trigger a null pointer dereference by using an invalid NFS sequence. This can panic the machine and deny access to the NFS server. Any outstanding disk writes to the NFS server will be lost.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: nfs: NULL pointer dereference due to an anomalized NFS message sequence", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-16871" }, { "category": "external", "summary": "RHBZ#1655162", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1655162" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-16871", "url": "https://www.cve.org/CVERecord?id=CVE-2018-16871" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-16871", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-16871" } ], "release_date": "2019-06-03T02:23:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-04-28T15:43:14+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2020:1769" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: nfs: NULL pointer dereference due to an anomalized NFS message sequence" }, { "cve": "CVE-2019-5108", "cwe": { "id": "CWE-440", "name": "Expected Behavior Violation" }, "discovery_date": "2020-01-10T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1789927" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Linux kernel\u2019s implementation of the WiFi station handoff code. An attacker within the radio range could use this flaw to deny a valid device from joining the access point.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: triggering AP to send IAPP location updates for stations before the required authentication process has completed can lead to DoS", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-5108" }, { "category": "external", "summary": "RHBZ#1789927", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1789927" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-5108", "url": "https://www.cve.org/CVERecord?id=CVE-2019-5108" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-5108", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-5108" } ], "release_date": "2019-12-11T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-04-28T15:43:14+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2020:1769" }, { "category": "workaround", "details": "At this time there is no known mitigations to this issue other than to install the updated kernel package.", "product_ids": [ "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "CRB-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debug-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-doc-0:4.18.0-193.el8.noarch", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-headers-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-modules-extra-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-tools-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:kernel-tools-libs-devel-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:kernel-zfcpdump-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-core-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-devel-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:perf-debuginfo-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-0:4.18.0-193.el8.x86_64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.aarch64", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.ppc64le", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.s390x", "CRB-8.2.0.GA:python3-perf-debuginfo-0:4.18.0-193.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: triggering AP to send IAPP location updates for stations before the required authentication process has completed can lead to DoS" }, { "cve": "CVE-2019-8980", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-02-21T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1679972" } ], "notes": [ { "category": "description", "text": "A kernel memory leak was found in the kernel_read_file() function in the fs/exec.c file in the Linux kernel. An attacker could use this flaw to cause a memory leak and thus a denial of service (DoS).", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: memory leak in the kernel_read_file function in fs/exec.c allows to cause a denial of service", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:bpftool-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.src", "BaseOS-8.2.0.GA:kernel-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-abi-whitelists-0:4.18.0-193.el8.noarch", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-cross-headers-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-core-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.ppc64le", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.s390x", "BaseOS-8.2.0.GA:kernel-debug-debuginfo-0:4.18.0-193.el8.x86_64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.aarch64", "BaseOS-8.2.0.GA:kernel-debug-devel-0:4.18.0-193.el8.ppc64le", "BaseOS-8